Max level shown:
12025-03-01T00:11:50.101ZDEBGtest_instance_serial (init_with_steps): Running step start_crdb
22025-03-01T00:11:50.101ZDEBGtest_instance_serial: Starting CRDB
32025-03-01T00:11:50.101ZINFOtest_instance_serial: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpkCsabT
42025-03-01T00:11:50.101ZINFOtest_instance_serial: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/e4d56e3c7515cdd0473c40c83d86cf638c3f9200aae213c4e08263bd7fbbdfa6.tar) to storage directory (/var/tmp/omicron_tmp/.tmpkCsabT/data)
52025-03-01T00:11:50.123ZINFOtest_instance_serial: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpkCsabT/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpkCsabT/listen-url
62025-03-01T00:11:50.123ZINFOtest_instance_serial: cockroach environment: BUILDOMAT_JOB_ID=01JN7ET8JVEKFGV4DBY12CVTKJ BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/e4d56e3c7515cdd0473c40c83d86cf638c3f9200aae213c4e08263bd7fbbdfa6.tar GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=a565ec3e069e5ec516fdec16863caf4d2daabe18 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-98bfaf87d6ef69bf/out:/work/oxidecomputer/omicron/target/debug/build/blake3-103919f6041ab3f8/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d2d35fe10b7a6017/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-09797cc11a735103/out/build:/work/oxidecomputer/omicron/target/debug/build/libz-sys-bbc564bfd69a09a3/out/lib:/work/oxidecomputer/omicron/target/debug/build/ring-b5bcf92b015a4487/out:/work/oxidecomputer/omicron/target/debug/build/tofino-0b7bd292c27101e0/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/lib/rustlib/x86_64-unknown-linux-gnu/lib:/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-98bfaf87d6ef69bf/out:/work/oxidecomputer/omicron/target/debug/build/blake3-103919f6041ab3f8/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-d2d35fe10b7a6017/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-09797cc11a735103/out/build:/work/oxidecomputer/omicron/target/debug/build/libz-sys-bbc564bfd69a09a3/out/lib:/work/oxidecomputer/omicron/target/debug/build/ring-b5bcf92b015a4487/out:/work/oxidecomputer/omicron/target/debug/build/tofino-0b7bd292c27101e0/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/lib/rustlib/x86_64-unknown-linux-gnu/lib:/home/build/.rustup/toolchains/1.84.0-x86_64-unknown-linux-gnu/lib NEXTEST_RUN_ID=4e2a6581-1d15-4109-a286-724f4e70a528 OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-3f05508105c4e978/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=-D warnings RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.84.0-x86_64-unknown-linux-gnu RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/lib/ssl/certs SSL_CERT_FILE=/usr/lib/ssl/certs/ca-certificates.crt TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build __NEXTEST_ATTEMPT=1
72025-03-01T00:11:51.287ZINFOtest_instance_serial: cockroach pid: 143149
82025-03-01T00:11:51.289ZINFOtest_instance_serial: cockroach listen URL: postgresql://root@[::1]:32871/omicron?sslmode=disable
92025-03-01T00:11:51.289ZDEBGtest_instance_serial (init_with_steps): Running step start_clickhouse
102025-03-01T00:11:51.289ZDEBGtest_instance_serial: Starting Clickhouse
112025-03-01T00:11:52.637ZDEBGtest_instance_serial (init_with_steps): Running step start_gateway_switch0
122025-03-01T00:11:52.637ZDEBGtest_instance_serial: Starting Management Gateway
132025-03-01T00:11:52.782ZDEBGtest_instance_serial (init_with_steps): Running step start_dendrite_switch0
142025-03-01T00:11:52.783ZDEBGtest_instance_serial: Starting Dendrite for switch0
152025-03-01T00:11:52.873ZDEBGtest_instance_serial (init_with_steps): Running step start_mgd_switch0
162025-03-01T00:11:52.873ZDEBGtest_instance_serial: Starting mgd for switch0
172025-03-01T00:11:52.940ZDEBGtest_instance_serial: mgd port is 43963
182025-03-01T00:11:52.941ZDEBGtest_instance_serial (init_with_steps): Running step record_switch_dns
192025-03-01T00:11:52.941ZDEBGtest_instance_serial: Recording DNS for the switch zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 switch_location = switch0
202025-03-01T00:11:52.941ZDEBGtest_instance_serial (init_with_steps): Running step start_internal_dns
212025-03-01T00:11:52.941ZINFOtest_instance_serial (store): opening sled database path = /var/tmp/omicron_tmp/.tmpcbqPkE
222025-03-01T00:11:53.028ZINFOtest_instance_serial (store): pruning trees for generations newer than 0
232025-03-01T00:11:53.028ZINFOtest_instance_serial (store): pruning trees for generations older than 0 keep = 3
242025-03-01T00:11:53.028ZINFOtest_instance_serial (dns): DNS server bound to address kind = dns local_address = [::1]:40197
252025-03-01T00:11:53.029ZDEBGtest_instance_serial (http): registered endpoint kind = dns local_addr = [::1]:42817 method = GET path = /config versions = all
262025-03-01T00:11:53.029ZDEBGtest_instance_serial (http): registered endpoint kind = dns local_addr = [::1]:42817 method = PUT path = /config versions = all
272025-03-01T00:11:53.029ZINFOtest_instance_serial (http): listening kind = dns local_addr = [::1]:42817
282025-03-01T00:11:53.029ZDEBGtest_instance_serial (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:42817
292025-03-01T00:11:53.029ZDEBGtest_instance_serial (init_with_steps): Running step start_external_dns
302025-03-01T00:11:53.030ZINFOtest_instance_serial (store): opening sled database path = /var/tmp/omicron_tmp/.tmpleSoB7
312025-03-01T00:11:53.030ZINFOtest_instance_serial (store): pruning trees for generations newer than 0
322025-03-01T00:11:53.030ZINFOtest_instance_serial (store): pruning trees for generations older than 0 keep = 3
332025-03-01T00:11:53.030ZINFOtest_instance_serial (dns): DNS server bound to address kind = dns local_address = [::1]:50582
342025-03-01T00:11:53.031ZDEBGtest_instance_serial (http): registered endpoint kind = dns local_addr = [::1]:44469 method = GET path = /config versions = all
352025-03-01T00:11:53.031ZDEBGtest_instance_serial (http): registered endpoint kind = dns local_addr = [::1]:44469 method = PUT path = /config versions = all
362025-03-01T00:11:53.031ZINFOtest_instance_serial (http): listening kind = dns local_addr = [::1]:44469
372025-03-01T00:11:53.031ZDEBGtest_instance_serial (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:44469
382025-03-01T00:11:53.031ZDEBGtest_instance_serial (init_with_steps): Running step start_nexus_internal
392025-03-01T00:11:53.031ZDEBGtest_instance_serial: Starting Nexus (internal API)
402025-03-01T00:11:53.031ZINFOtest_instance_serial: setting up nexus server
412025-03-01T00:11:53.031ZINFOtest_instance_serial (ServerContext): registering Oso class class = Action
422025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = AnyActor
432025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = AuthenticatedActor
442025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = BlueprintConfig
452025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = Database
462025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = DnsConfig
472025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = Fleet
482025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = Inventory
492025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = IpPoolList
502025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = ConsoleSessionList
512025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = DeviceAuthRequestList
522025-03-01T00:11:53.032ZINFOtest_instance_serial (ServerContext): registering Oso class class = SiloCertificateList
532025-03-01T00:11:53.036ZINFOtest_instance_serial (ServerContext): registering Oso class class = SiloIdentityProviderList
542025-03-01T00:11:53.036ZINFOtest_instance_serial (ServerContext): registering Oso class class = SiloUserList
552025-03-01T00:11:53.036ZINFOtest_instance_serial (ServerContext): registering Oso class class = Project
562025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = Disk
572025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = Snapshot
582025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = ProjectImage
592025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = Instance
602025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = IpPool
612025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = InstanceNetworkInterface
622025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = Vpc
632025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = VpcRouter
642025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = InternetGateway
652025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = InternetGatewayIpPool
662025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = InternetGatewayIpAddress
672025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = RouterRoute
682025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = VpcSubnet
692025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = FloatingIp
702025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = Image
712025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = SiloImage
722025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = AddressLot
732025-03-01T00:11:53.037ZINFOtest_instance_serial (ServerContext): registering Oso class class = Blueprint
742025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = LoopbackAddress
752025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = Certificate
762025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = ConsoleSession
772025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = DeviceAuthRequest
782025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = DeviceAccessToken
792025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = PhysicalDisk
802025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = Rack
812025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = RoleBuiltin
822025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = SshKey
832025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = Silo
842025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = SiloUser
852025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = SiloGroup
862025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = SupportBundle
872025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = IdentityProvider
882025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = SamlIdentityProvider
892025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = Sled
902025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = TufRepo
912025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = TufArtifact
922025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = Zpool
932025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = Service
942025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): registering Oso class class = UserBuiltin
952025-03-01T00:11:53.038ZINFOtest_instance_serial (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
962025-03-01T00:11:53.051ZINFOtest_instance_serial (ServerContext): Setting up resolver using DNS address: [::1]:40197
972025-03-01T00:11:53.051ZINFOtest_instance_serial (DnsResolver): new DNS resolver addresses = [[::1]:40197]
982025-03-01T00:11:53.051ZINFOtest_instance_serial (ServerContext): Setting up qorb database pool from a single host url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:32871/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 32871,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n },\n}
992025-03-01T00:11:53.051ZDEBGtest_instance_serial (ServerContext): registered USDT probes
1002025-03-01T00:11:53.110ZINFOtest_instance_serial (nexus): Database schema version is up to date desired_version = 122.0.0 found_version = 122.0.0
1012025-03-01T00:11:53.296ZDEBGtest_instance_serial (clickhouse-client): registered USDT probes id = cc344f84-7760-4d0f-a9a0-60fc66e2bb40
1022025-03-01T00:11:53.301ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /bgtasks versions = all
1032025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /bgtasks/activate versions = all
1042025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /bgtasks/view/{bgtask_name} versions = all
1052025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /clickhouse/policy versions = all
1062025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /clickhouse/policy versions = all
1072025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request versions = all
1082025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped versions = all
1092025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress versions = all
1102025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-finish versions = all
1112025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-start versions = all
1122025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /demo-saga versions = all
1132025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /demo-saga/{demo_saga_id}/complete versions = all
1142025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /deployment/blueprints/all versions = all
1152025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = DELETE path = /deployment/blueprints/all/{blueprint_id} versions = all
1162025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /deployment/blueprints/all/{blueprint_id} versions = all
1172025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /deployment/blueprints/import versions = all
1182025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /deployment/blueprints/regenerate versions = all
1192025-03-01T00:11:53.302ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /deployment/blueprints/target versions = all
1202025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /deployment/blueprints/target versions = all
1212025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = PUT path = /deployment/blueprints/target/enabled versions = all
1222025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /disk/{disk_id}/remove-read-only-parent versions = all
1232025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = PUT path = /disks/{disk_id} versions = all
1242025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /instances/{instance_id}/migrate versions = all
1252025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /metrics/collectors versions = all
1262025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /metrics/collectors/{collector_id}/producers versions = all
1272025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /metrics/producers versions = all
1282025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /nat/ipv4/changeset/{from_gen} versions = all
1292025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /physical-disk/expunge versions = all
1302025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /probes/{sled} versions = all
1312025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = PUT path = /racks/{rack_id}/initialization-complete versions = all
1322025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /sagas versions = all
1332025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /sagas/{saga_id} versions = all
1342025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /sled-agents/{sled_id} versions = all
1352025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /sled-agents/{sled_id} versions = all
1362025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /sled-agents/{sled_id}/firewall-rules-update versions = all
1372025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /sleds/add versions = all
1382025-03-01T00:11:53.303ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /sleds/expunge versions = all
1392025-03-01T00:11:53.304ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = GET path = /sleds/uninitialized versions = all
1402025-03-01T00:11:53.304ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = PUT path = /switch/{switch_id} versions = all
1412025-03-01T00:11:53.304ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = PUT path = /vmms/{propolis_id} versions = all
1422025-03-01T00:11:53.304ZDEBGtest_instance_serial (dropshot_internal): registered endpoint local_addr = 127.0.0.1:41715 method = POST path = /volume/{volume_id}/remove-read-only-parent versions = all
1432025-03-01T00:11:53.304ZINFOtest_instance_serial (dropshot_internal): listening local_addr = 127.0.0.1:41715
1442025-03-01T00:11:53.304ZDEBGtest_instance_serial (dropshot_internal): successfully registered DTrace USDT probes local_addr = 127.0.0.1:41715
1452025-03-01T00:11:53.304ZINFOtest_instance_serial (SEC): SEC running sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
1462025-03-01T00:11:53.304ZTRACtest_instance_serial (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1472025-03-01T00:11:53.304ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1482025-03-01T00:11:53.305ZDEBGtest_instance_serial (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1492025-03-01T00:11:53.305ZDEBGtest_instance_serial (DataLoader): attempting to create built-in users
1502025-03-01T00:11:53.307ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1512025-03-01T00:11:53.307ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1522025-03-01T00:11:53.307ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1532025-03-01T00:11:53.321ZTRACtest_instance_serial (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 7e cc 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ~............_cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:62419 req_id = 57caed0f-703d-4fc4-9387-252fce8b6538
1542025-03-01T00:11:53.321ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 32460,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62419 req_id = 57caed0f-703d-4fc4-9387-252fce8b6538
1552025-03-01T00:11:53.323ZERROtest_instance_serial (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 32460, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_crucible-pantry._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 16, 95, 99, 114, 117, 99, 105, 98, 108, 101, 45, 112, 97, 110, 116, 114, 121, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:62419 req_id = 57caed0f-703d-4fc4-9387-252fce8b6538
1562025-03-01T00:11:53.348ZINFOtest_instance_serial (DataLoader): created 5 built-in users
1572025-03-01T00:11:53.350ZTRACtest_instance_serial (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1582025-03-01T00:11:53.350ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1592025-03-01T00:11:53.351ZDEBGtest_instance_serial (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1602025-03-01T00:11:53.352ZDEBGtest_instance_serial (DataLoader): attempting to create built-in roles
1612025-03-01T00:11:53.352ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1622025-03-01T00:11:53.352ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1632025-03-01T00:11:53.352ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1642025-03-01T00:11:53.388ZINFOtest_instance_serial (DataLoader): created 10 built-in roles
1652025-03-01T00:11:53.388ZTRACtest_instance_serial (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1662025-03-01T00:11:53.388ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1672025-03-01T00:11:53.391ZDEBGtest_instance_serial (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1682025-03-01T00:11:53.391ZDEBGtest_instance_serial (DataLoader): attempting to create built-in role assignments
1692025-03-01T00:11:53.391ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1702025-03-01T00:11:53.391ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1712025-03-01T00:11:53.392ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1722025-03-01T00:11:53.893ZINFOtest_instance_serial (DataLoader): created 4 built-in role assignments
1732025-03-01T00:11:53.893ZTRACtest_instance_serial (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1742025-03-01T00:11:53.893ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1752025-03-01T00:11:53.896ZDEBGtest_instance_serial (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1762025-03-01T00:11:53.896ZDEBGtest_instance_serial (DataLoader): attempting to create built-in silos
1772025-03-01T00:11:53.896ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1782025-03-01T00:11:53.897ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1792025-03-01T00:11:53.897ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1802025-03-01T00:11:54.063ZINFOtest_instance_serial (DataLoader): created 2 built-in silos
1812025-03-01T00:11:54.063ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1822025-03-01T00:11:54.063ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1832025-03-01T00:11:54.063ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1842025-03-01T00:11:54.096ZTRACtest_instance_serial (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1852025-03-01T00:11:54.096ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1862025-03-01T00:11:54.096ZDEBGtest_instance_serial (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1872025-03-01T00:11:54.096ZDEBGtest_instance_serial (DataLoader): attempting to create built-in projects
1882025-03-01T00:11:54.096ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1892025-03-01T00:11:54.096ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1902025-03-01T00:11:54.097ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1912025-03-01T00:11:54.100ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
1922025-03-01T00:11:54.100ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
1932025-03-01T00:11:54.101ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1942025-03-01T00:11:54.101ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1952025-03-01T00:11:54.102ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
1962025-03-01T00:11:54.191ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
1972025-03-01T00:11:54.193ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
1982025-03-01T00:11:54.193ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
1992025-03-01T00:11:54.193ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2002025-03-01T00:11:54.195ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2012025-03-01T00:11:54.198ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2022025-03-01T00:11:54.200ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2032025-03-01T00:11:54.200ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2042025-03-01T00:11:54.200ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2052025-03-01T00:11:54.200ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2062025-03-01T00:11:54.201ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2072025-03-01T00:11:54.215ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2082025-03-01T00:11:54.215ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2092025-03-01T00:11:54.215ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2102025-03-01T00:11:54.216ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2112025-03-01T00:11:54.218ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2122025-03-01T00:11:54.223ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2132025-03-01T00:11:54.223ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2142025-03-01T00:11:54.223ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2152025-03-01T00:11:54.224ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2162025-03-01T00:11:54.283ZINFOtest_instance_serial (DataLoader): created built-in services project
2172025-03-01T00:11:54.284ZTRACtest_instance_serial (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2182025-03-01T00:11:54.284ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2192025-03-01T00:11:54.287ZDEBGtest_instance_serial (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2202025-03-01T00:11:54.287ZDEBGtest_instance_serial (DataLoader): attempting to create built-in VPCs
2212025-03-01T00:11:54.287ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2222025-03-01T00:11:54.287ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2232025-03-01T00:11:54.287ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2242025-03-01T00:11:54.295ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2252025-03-01T00:11:54.295ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2262025-03-01T00:11:54.295ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2272025-03-01T00:11:54.300ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2282025-03-01T00:11:54.302ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2292025-03-01T00:11:54.302ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2302025-03-01T00:11:54.302ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2312025-03-01T00:11:54.302ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2322025-03-01T00:11:54.304ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2332025-03-01T00:11:54.304ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2342025-03-01T00:11:54.304ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2352025-03-01T00:11:54.306ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2362025-03-01T00:11:54.309ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2372025-03-01T00:11:54.310ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2382025-03-01T00:11:54.310ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2392025-03-01T00:11:54.310ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2402025-03-01T00:11:54.312ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2412025-03-01T00:11:54.320ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2422025-03-01T00:11:54.320ZTRACtest_instance_serial (DataLoader): successful lookup of siloed resource "Project" using built-in user
2432025-03-01T00:11:54.320ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2442025-03-01T00:11:54.320ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2452025-03-01T00:11:54.320ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2462025-03-01T00:11:54.320ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2472025-03-01T00:11:54.320ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2482025-03-01T00:11:54.323ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2492025-03-01T00:11:54.323ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2502025-03-01T00:11:54.323ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2512025-03-01T00:11:54.324ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2522025-03-01T00:11:54.326ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2532025-03-01T00:11:54.326ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2542025-03-01T00:11:54.326ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2552025-03-01T00:11:54.327ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2562025-03-01T00:11:54.383ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2572025-03-01T00:11:54.389ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2582025-03-01T00:11:54.389ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2592025-03-01T00:11:54.389ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2602025-03-01T00:11:54.390ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2612025-03-01T00:11:54.441ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2622025-03-01T00:11:54.441ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2632025-03-01T00:11:54.441ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2642025-03-01T00:11:54.441ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2652025-03-01T00:11:54.442ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2662025-03-01T00:11:54.444ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2672025-03-01T00:11:54.444ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2682025-03-01T00:11:54.444ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2692025-03-01T00:11:54.444ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2702025-03-01T00:11:54.446ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2712025-03-01T00:11:54.446ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2722025-03-01T00:11:54.446ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2732025-03-01T00:11:54.447ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2742025-03-01T00:11:54.449ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2752025-03-01T00:11:54.459ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
2762025-03-01T00:11:54.459ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2772025-03-01T00:11:54.459ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2782025-03-01T00:11:54.461ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2792025-03-01T00:11:54.500ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2802025-03-01T00:11:54.500ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2812025-03-01T00:11:54.501ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2822025-03-01T00:11:54.532ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2832025-03-01T00:11:54.533ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2842025-03-01T00:11:54.533ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2852025-03-01T00:11:54.537ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
2862025-03-01T00:11:54.537ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2872025-03-01T00:11:54.537ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2882025-03-01T00:11:54.539ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2892025-03-01T00:11:54.539ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2902025-03-01T00:11:54.540ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2912025-03-01T00:11:54.540ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2922025-03-01T00:11:54.540ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2932025-03-01T00:11:54.541ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2942025-03-01T00:11:54.543ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2952025-03-01T00:11:54.543ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
2962025-03-01T00:11:54.543ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2972025-03-01T00:11:54.544ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
2982025-03-01T00:11:54.545ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
2992025-03-01T00:11:54.553ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3002025-03-01T00:11:54.553ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3012025-03-01T00:11:54.553ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3022025-03-01T00:11:54.554ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3032025-03-01T00:11:54.616ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3042025-03-01T00:11:54.618ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3052025-03-01T00:11:54.618ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3062025-03-01T00:11:54.618ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3072025-03-01T00:11:54.618ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3082025-03-01T00:11:54.619ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3092025-03-01T00:11:54.621ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3102025-03-01T00:11:54.621ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3112025-03-01T00:11:54.621ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3122025-03-01T00:11:54.622ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3132025-03-01T00:11:54.622ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3142025-03-01T00:11:54.622ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3152025-03-01T00:11:54.622ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3162025-03-01T00:11:54.624ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3172025-03-01T00:11:54.630ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3182025-03-01T00:11:54.630ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3192025-03-01T00:11:54.631ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3202025-03-01T00:11:54.631ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3212025-03-01T00:11:54.764ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3222025-03-01T00:11:54.764ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3232025-03-01T00:11:54.765ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3242025-03-01T00:11:54.765ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3252025-03-01T00:11:54.766ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3262025-03-01T00:11:54.767ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3272025-03-01T00:11:54.767ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3282025-03-01T00:11:54.767ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3292025-03-01T00:11:54.767ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3302025-03-01T00:11:54.769ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3312025-03-01T00:11:54.769ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3322025-03-01T00:11:54.769ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3332025-03-01T00:11:54.770ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3342025-03-01T00:11:54.771ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3352025-03-01T00:11:54.779ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3362025-03-01T00:11:54.779ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3372025-03-01T00:11:54.779ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3382025-03-01T00:11:54.779ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3392025-03-01T00:11:54.798ZDEBGtest_instance_serial (DataLoader): attempting to create built-in VPC firewall rules
3402025-03-01T00:11:54.798ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3412025-03-01T00:11:54.798ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3422025-03-01T00:11:54.799ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3432025-03-01T00:11:54.809ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3442025-03-01T00:11:54.809ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3452025-03-01T00:11:54.810ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3462025-03-01T00:11:54.813ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3472025-03-01T00:11:54.813ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3482025-03-01T00:11:54.814ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3492025-03-01T00:11:54.820ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3502025-03-01T00:11:54.820ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3512025-03-01T00:11:54.820ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3522025-03-01T00:11:54.820ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3532025-03-01T00:11:54.820ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3542025-03-01T00:11:54.820ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3552025-03-01T00:11:54.820ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3562025-03-01T00:11:54.820ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3572025-03-01T00:11:54.821ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3582025-03-01T00:11:54.834ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3592025-03-01T00:11:54.834ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3602025-03-01T00:11:54.835ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3612025-03-01T00:11:54.835ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3622025-03-01T00:11:54.838ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3632025-03-01T00:11:54.847ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3642025-03-01T00:11:54.848ZTRACtest_instance_serial (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
3652025-03-01T00:11:54.848ZTRACtest_instance_serial (DataLoader): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3662025-03-01T00:11:54.848ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3672025-03-01T00:11:54.848ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3682025-03-01T00:11:54.848ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3692025-03-01T00:11:54.848ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3702025-03-01T00:11:54.850ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3712025-03-01T00:11:54.851ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3722025-03-01T00:11:54.851ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3732025-03-01T00:11:54.855ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3742025-03-01T00:11:54.857ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3752025-03-01T00:11:54.857ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3762025-03-01T00:11:54.857ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3772025-03-01T00:11:54.859ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3782025-03-01T00:11:54.860ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3792025-03-01T00:11:54.876ZDEBGtest_instance_serial (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3802025-03-01T00:11:54.877ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3812025-03-01T00:11:54.877ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3822025-03-01T00:11:54.877ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3832025-03-01T00:11:54.924ZTRACtest_instance_serial (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3842025-03-01T00:11:54.924ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3852025-03-01T00:11:54.924ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3862025-03-01T00:11:54.924ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3872025-03-01T00:11:54.924ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3882025-03-01T00:11:54.928ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3892025-03-01T00:11:54.928ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3902025-03-01T00:11:54.928ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3912025-03-01T00:11:54.929ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3922025-03-01T00:11:54.931ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3932025-03-01T00:11:54.932ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3942025-03-01T00:11:54.932ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3952025-03-01T00:11:54.932ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
3962025-03-01T00:11:54.934ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
3972025-03-01T00:11:54.942ZDEBGtest_instance_serial (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
3982025-03-01T00:11:54.942ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
3992025-03-01T00:11:54.942ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4002025-03-01T00:11:54.942ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4012025-03-01T00:11:55.066ZINFOtest_instance_serial (DataLoader): created built-in VPC firewall rules
4022025-03-01T00:11:55.066ZDEBGtest_instance_serial (DataLoader): attempting to create built-in VPC Subnets
4032025-03-01T00:11:55.066ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4042025-03-01T00:11:55.066ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4052025-03-01T00:11:55.066ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4062025-03-01T00:11:55.084ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4072025-03-01T00:11:55.084ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4082025-03-01T00:11:55.084ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4092025-03-01T00:11:55.086ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4102025-03-01T00:11:55.086ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4112025-03-01T00:11:55.086ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4122025-03-01T00:11:55.088ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4132025-03-01T00:11:55.088ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4142025-03-01T00:11:55.088ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4152025-03-01T00:11:55.088ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4162025-03-01T00:11:55.088ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4172025-03-01T00:11:55.090ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4182025-03-01T00:11:55.090ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4192025-03-01T00:11:55.090ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4202025-03-01T00:11:55.090ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4212025-03-01T00:11:55.092ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4222025-03-01T00:11:55.092ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4232025-03-01T00:11:55.092ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4242025-03-01T00:11:55.092ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4252025-03-01T00:11:55.094ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4262025-03-01T00:11:55.100ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4272025-03-01T00:11:55.100ZTRACtest_instance_serial (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4282025-03-01T00:11:55.100ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4292025-03-01T00:11:55.101ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4302025-03-01T00:11:55.101ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4312025-03-01T00:11:55.140ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4322025-03-01T00:11:55.141ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4332025-03-01T00:11:55.141ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4342025-03-01T00:11:55.141ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4352025-03-01T00:11:55.143ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4362025-03-01T00:11:55.146ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4372025-03-01T00:11:55.147ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4382025-03-01T00:11:55.147ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4392025-03-01T00:11:55.147ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4402025-03-01T00:11:55.149ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4412025-03-01T00:11:55.149ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4422025-03-01T00:11:55.149ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4432025-03-01T00:11:55.150ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4442025-03-01T00:11:55.153ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4452025-03-01T00:11:55.161ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4462025-03-01T00:11:55.171ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4472025-03-01T00:11:55.172ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4482025-03-01T00:11:55.172ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4492025-03-01T00:11:55.268ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4502025-03-01T00:11:55.269ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4512025-03-01T00:11:55.269ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4522025-03-01T00:11:55.277ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4532025-03-01T00:11:55.277ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4542025-03-01T00:11:55.277ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4552025-03-01T00:11:55.277ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4562025-03-01T00:11:55.277ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4572025-03-01T00:11:55.281ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4582025-03-01T00:11:55.282ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4592025-03-01T00:11:55.282ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4602025-03-01T00:11:55.282ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4612025-03-01T00:11:55.283ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4622025-03-01T00:11:55.284ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4632025-03-01T00:11:55.284ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4642025-03-01T00:11:55.284ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4652025-03-01T00:11:55.285ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4662025-03-01T00:11:55.292ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
4672025-03-01T00:11:55.293ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4682025-03-01T00:11:55.294ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4692025-03-01T00:11:55.294ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4702025-03-01T00:11:55.311ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4712025-03-01T00:11:55.311ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4722025-03-01T00:11:55.311ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4732025-03-01T00:11:55.314ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4742025-03-01T00:11:55.314ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4752025-03-01T00:11:55.314ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4762025-03-01T00:11:55.314ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4772025-03-01T00:11:55.315ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4782025-03-01T00:11:55.316ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4792025-03-01T00:11:55.316ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4802025-03-01T00:11:55.316ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4812025-03-01T00:11:55.316ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4822025-03-01T00:11:55.318ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4832025-03-01T00:11:55.319ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4842025-03-01T00:11:55.319ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4852025-03-01T00:11:55.319ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4862025-03-01T00:11:55.320ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4872025-03-01T00:11:55.326ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4882025-03-01T00:11:55.348ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4892025-03-01T00:11:55.348ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4902025-03-01T00:11:55.349ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4912025-03-01T00:11:55.393ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4922025-03-01T00:11:55.393ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4932025-03-01T00:11:55.395ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4942025-03-01T00:11:55.401ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4952025-03-01T00:11:55.401ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4962025-03-01T00:11:55.401ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
4972025-03-01T00:11:55.401ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
4982025-03-01T00:11:55.402ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
4992025-03-01T00:11:55.404ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5002025-03-01T00:11:55.404ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5012025-03-01T00:11:55.404ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5022025-03-01T00:11:55.404ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5032025-03-01T00:11:55.406ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5042025-03-01T00:11:55.407ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5052025-03-01T00:11:55.407ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5062025-03-01T00:11:55.407ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5072025-03-01T00:11:55.408ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5082025-03-01T00:11:55.416ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5092025-03-01T00:11:55.416ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5102025-03-01T00:11:55.416ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5112025-03-01T00:11:55.417ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5122025-03-01T00:11:55.432ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5132025-03-01T00:11:55.432ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5142025-03-01T00:11:55.432ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5152025-03-01T00:11:55.434ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5162025-03-01T00:11:55.436ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5172025-03-01T00:11:55.436ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5182025-03-01T00:11:55.436ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5192025-03-01T00:11:55.436ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5202025-03-01T00:11:55.436ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5212025-03-01T00:11:55.436ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5222025-03-01T00:11:55.437ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5232025-03-01T00:11:55.437ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5242025-03-01T00:11:55.438ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5252025-03-01T00:11:55.438ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5262025-03-01T00:11:55.439ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5272025-03-01T00:11:55.439ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5282025-03-01T00:11:55.440ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5292025-03-01T00:11:55.453ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5302025-03-01T00:11:55.462ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5312025-03-01T00:11:55.462ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5322025-03-01T00:11:55.462ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5332025-03-01T00:11:55.497ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5342025-03-01T00:11:55.502ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5352025-03-01T00:11:55.502ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5362025-03-01T00:11:55.506ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5372025-03-01T00:11:55.506ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5382025-03-01T00:11:55.506ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5392025-03-01T00:11:55.506ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5402025-03-01T00:11:55.507ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5412025-03-01T00:11:55.509ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5422025-03-01T00:11:55.510ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5432025-03-01T00:11:55.510ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5442025-03-01T00:11:55.510ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5452025-03-01T00:11:55.512ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5462025-03-01T00:11:55.514ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5472025-03-01T00:11:55.514ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5482025-03-01T00:11:55.514ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5492025-03-01T00:11:55.514ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5502025-03-01T00:11:55.522ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5512025-03-01T00:11:55.523ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5522025-03-01T00:11:55.523ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5532025-03-01T00:11:55.523ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5542025-03-01T00:11:55.544ZINFOtest_instance_serial (DataLoader): created built-in services vpc subnets
5552025-03-01T00:11:55.544ZINFOtest_instance_serial (DataLoader): created built-in services vpc
5562025-03-01T00:11:55.544ZTRACtest_instance_serial (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5572025-03-01T00:11:55.544ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5582025-03-01T00:11:55.546ZDEBGtest_instance_serial (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5592025-03-01T00:11:55.546ZDEBGtest_instance_serial (DataLoader): attempting to create silo users
5602025-03-01T00:11:55.546ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5612025-03-01T00:11:55.546ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5622025-03-01T00:11:55.547ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5632025-03-01T00:11:55.590ZINFOtest_instance_serial (DataLoader): created 2 silo users
5642025-03-01T00:11:55.590ZDEBGtest_instance_serial (DataLoader): attempting to create silo user role assignments
5652025-03-01T00:11:55.590ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5662025-03-01T00:11:55.590ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5672025-03-01T00:11:55.591ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5682025-03-01T00:11:55.597ZINFOtest_instance_serial (DataLoader): created 2 silo user role assignments
5692025-03-01T00:11:55.597ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5702025-03-01T00:11:55.597ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5712025-03-01T00:11:55.599ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5722025-03-01T00:11:55.606ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5732025-03-01T00:11:55.606ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5742025-03-01T00:11:55.606ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5752025-03-01T00:11:55.627ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5762025-03-01T00:11:55.627ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5772025-03-01T00:11:55.627ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5782025-03-01T00:11:55.627ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5792025-03-01T00:11:55.627ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5802025-03-01T00:11:55.631ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5812025-03-01T00:11:55.636ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5822025-03-01T00:11:55.636ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5832025-03-01T00:11:55.636ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5842025-03-01T00:11:55.637ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5852025-03-01T00:11:55.667ZTRACtest_instance_serial (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList
5862025-03-01T00:11:55.667ZTRACtest_instance_serial (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5872025-03-01T00:11:55.667ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5882025-03-01T00:11:55.667ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5892025-03-01T00:11:55.667ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5902025-03-01T00:11:55.673ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5912025-03-01T00:11:55.673ZDEBGtest_instance_serial (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = IpPoolList result = Ok(())
5922025-03-01T00:11:55.673ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5932025-03-01T00:11:55.673ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5942025-03-01T00:11:55.673ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5952025-03-01T00:11:55.824ZTRACtest_instance_serial (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database
5962025-03-01T00:11:55.824ZDEBGtest_instance_serial (DataLoader): roles roles = RoleSet { roles: {} }
5972025-03-01T00:11:55.825ZDEBGtest_instance_serial (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001, .. }) resource = Database result = Ok(())
5982025-03-01T00:11:55.834ZINFOtest_instance_serial (nexus): populate complete
5992025-03-01T00:11:55.834ZINFOtest_instance_serial (nexus): activating background tasks
6002025-03-01T00:11:55.834ZDEBGtest_instance_serial (init_with_steps): Running step start_sled1
6012025-03-01T00:11:55.834ZINFOtest_instance_serial (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6022025-03-01T00:11:55.865ZINFOtest_instance_serial (SledAgent): created simulated sled agent server = b6d65341-167c-41df-9b5c-41cded99c229 sim_mode = Explicit sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6032025-03-01T00:11:55.866ZINFOtest_instance_serial (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
6042025-03-01T00:11:55.900ZDEBGtest_instance_serial (dropshot (Repo Depot)): registered endpoint local_addr = [::1]:34345 method = GET path = /artifact/sha256/{sha256} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6052025-03-01T00:11:55.900ZINFOtest_instance_serial (dropshot (Repo Depot)): listening local_addr = [::1]:34345 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6062025-03-01T00:11:55.901ZDEBGtest_instance_serial (dropshot (Repo Depot)): successfully registered DTrace USDT probes local_addr = [::1]:34345 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6072025-03-01T00:11:55.905ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /artifacts sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6082025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = DELETE path = /artifacts/{sha256} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6092025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /artifacts/{sha256} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6102025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /artifacts/{sha256}/copy-from-depot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6112025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /boot-disk/{boot_disk}/os/write sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6122025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /boot-disk/{boot_disk}/os/write/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6132025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = DELETE path = /boot-disk/{boot_disk}/os/write/status/{update_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6142025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /bootstore/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6152025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /cockroachdb sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6162025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6172025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6182025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /disks/{disk_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6192025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /disks/{disk_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6202025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /eip-gateways sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6212025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6222025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6232025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6242025-03-01T00:11:55.906ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6252025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /omicron-physical-disks sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6262025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /omicron-zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6272025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /sled-identifiers sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6282025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /sled-role sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6292025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /sleds sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6302025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support/dladm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6312025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support/ipadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6322025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support/pargs-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6332025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support/pfiles-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6342025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support/pstack-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6352025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support/zoneadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6362025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support-bundles/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6372025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = DELETE path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6382025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6392025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6402025-03-01T00:11:55.907ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6412025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6422025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6432025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6442025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6452025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /switch-ports sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6462025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /timesync sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6472025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = DELETE path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6482025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6492025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6502025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = DELETE path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6512025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6522025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6532025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6542025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6552025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /vmms/{propolis_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6562025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6572025-03-01T00:11:55.908ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6582025-03-01T00:11:55.909ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6592025-03-01T00:11:55.909ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6602025-03-01T00:11:55.909ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6612025-03-01T00:11:55.909ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6622025-03-01T00:11:55.909ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6632025-03-01T00:11:55.909ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6642025-03-01T00:11:55.909ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /zones/bundle-cleanup sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6652025-03-01T00:11:55.910ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6662025-03-01T00:11:55.910ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = PUT path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6672025-03-01T00:11:55.910ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /zones/bundle-cleanup/utilization sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6682025-03-01T00:11:55.910ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /zones/bundles sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6692025-03-01T00:11:55.910ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6702025-03-01T00:11:55.910ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = POST path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6712025-03-01T00:11:55.910ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6722025-03-01T00:11:55.910ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6732025-03-01T00:11:55.911ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:38105 method = GET path = /zpools sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
6742025-03-01T00:11:55.911ZINFOtest_instance_serial (dropshot): listening local_addr = [::1]:38105 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6752025-03-01T00:11:55.911ZDEBGtest_instance_serial (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:38105 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6762025-03-01T00:11:55.911ZDEBGtest_instance_serial (omicron_sled_agent::sim::Server): contacting server nexus sled_id = b6d65341-167c-41df-9b5c-41cded99c229
6772025-03-01T00:11:55.911ZDEBGtest_instance_serial (NexusClient): client request body = Some(Body) method = POST sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:41715/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
6782025-03-01T00:11:55.911ZINFOtest_instance_serial (dropshot_internal): accepted connection local_addr = 127.0.0.1:41715 remote_addr = 127.0.0.1:42630
6792025-03-01T00:11:55.912ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 1 reason = Timeout
6802025-03-01T00:11:55.912ZDEBGtest_instance_serial (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
6812025-03-01T00:11:55.912ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
6822025-03-01T00:11:55.912ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
6832025-03-01T00:11:55.912ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
6842025-03-01T00:11:55.912ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 1 reason = Timeout
6852025-03-01T00:11:55.912ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
6862025-03-01T00:11:55.912ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 1 reason = Timeout
6872025-03-01T00:11:55.912ZWARNtest_instance_serial (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config nor servers
6882025-03-01T00:11:55.912ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 52.521\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6892025-03-01T00:11:55.912ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 1 reason = Timeout
6902025-03-01T00:11:55.913ZDEBGtest_instance_serial (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
6912025-03-01T00:11:55.913ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
6922025-03-01T00:11:55.913ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
6932025-03-01T00:11:55.913ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
6942025-03-01T00:11:55.913ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 1 reason = Timeout
6952025-03-01T00:11:55.913ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
6962025-03-01T00:11:55.913ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 1 reason = Timeout
6972025-03-01T00:11:55.913ZWARNtest_instance_serial (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config nor servers
6982025-03-01T00:11:55.913ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 281.367\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6992025-03-01T00:11:55.913ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 1 reason = Timeout
7002025-03-01T00:11:55.914ZINFOtest_instance_serial (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2025-03-01 00:01:55.914036999 UTC
7012025-03-01T00:11:55.915ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database
7022025-03-01T00:11:55.915ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
7032025-03-01T00:11:55.915ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
7042025-03-01T00:11:55.915ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = external_endpoints iteration = 1 reason = Timeout
7052025-03-01T00:11:55.915ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
7062025-03-01T00:11:55.915ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7072025-03-01T00:11:55.915ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
7082025-03-01T00:11:55.915ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
7092025-03-01T00:11:55.915ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
7102025-03-01T00:11:55.916ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = nat_v4_garbage_collector iteration = 1 reason = Timeout
7112025-03-01T00:11:55.916ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database
7122025-03-01T00:11:55.916ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = nat_v4_garbage_collector roles = RoleSet { roles: {} }
7132025-03-01T00:11:55.917ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = nat_v4_garbage_collector resource = Database result = Ok(())
7142025-03-01T00:11:55.918ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = bfd_manager iteration = 1 reason = Timeout
7152025-03-01T00:11:55.918ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database
7162025-03-01T00:11:55.918ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
7172025-03-01T00:11:55.918ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = bfd_manager resource = Database result = Ok(())
7182025-03-01T00:11:55.918ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = phantom_disks iteration = 1 reason = Timeout
7192025-03-01T00:11:55.918ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = blueprint_loader iteration = 1 reason = Timeout
7202025-03-01T00:11:55.918ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig
7212025-03-01T00:11:55.918ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7222025-03-01T00:11:55.918ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
7232025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
7242025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
7252025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = blueprint_executor iteration = 1 reason = Timeout
7262025-03-01T00:11:55.919ZWARNtest_instance_serial (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = no blueprint
7272025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 31.761\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7282025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 1 reason = Timeout
7292025-03-01T00:11:55.919ZWARNtest_instance_serial (BackgroundTasks): Blueprint execution: skipped background_task = crdb_node_id_collector reason = no blueprint
7302025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 14.04\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7312025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = inventory_collection iteration = 1 reason = Timeout
7322025-03-01T00:11:55.919ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
7332025-03-01T00:11:55.919ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7342025-03-01T00:11:55.919ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
7352025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
7362025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
7372025-03-01T00:11:55.919ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = support_bundle_collector iteration = 1 reason = Timeout
7382025-03-01T00:11:55.919ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet
7392025-03-01T00:11:55.919ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7402025-03-01T00:11:55.919ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
7412025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
7422025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
7432025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 1 reason = Timeout
7442025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 38.65\u{b5}s iteration = 1 status = {"error":"task disabled"}
7452025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 1 reason = Timeout
7462025-03-01T00:11:55.920ZWARNtest_instance_serial (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
7472025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 25.18\u{b5}s iteration = 1 status = {"error":"no blueprint"}
7482025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 1 reason = Timeout
7492025-03-01T00:11:55.920ZINFOtest_instance_serial (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
7502025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 40.641\u{b5}s iteration = 1 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
7512025-03-01T00:11:55.920ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 1 reason = Timeout
7522025-03-01T00:11:55.920ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory
7532025-03-01T00:11:55.923ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_zone_nat_tracker resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7542025-03-01T00:11:55.924ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
7552025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
7562025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
7572025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 1 reason = Timeout
7582025-03-01T00:11:55.924ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet
7592025-03-01T00:11:55.924ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7602025-03-01T00:11:55.924ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
7612025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
7622025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
7632025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = v2p_manager iteration = 1 reason = Timeout
7642025-03-01T00:11:55.924ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
7652025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
7662025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
7672025-03-01T00:11:55.924ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = region_replacement iteration = 1 reason = Timeout
7682025-03-01T00:11:55.924ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
7692025-03-01T00:11:55.928ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
7702025-03-01T00:11:55.929ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
7712025-03-01T00:11:55.929ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = region_replacement_driver iteration = 1 reason = Timeout
7722025-03-01T00:11:55.930ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
7732025-03-01T00:11:55.930ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
7742025-03-01T00:11:55.930ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
7752025-03-01T00:11:55.930ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = instance_watcher iteration = 1 reason = Timeout
7762025-03-01T00:11:55.930ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet
7772025-03-01T00:11:55.930ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7782025-03-01T00:11:55.930ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
7792025-03-01T00:11:55.930ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
7802025-03-01T00:11:55.930ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
7812025-03-01T00:11:55.930ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = instance_updater iteration = 1 reason = Timeout
7822025-03-01T00:11:55.930ZINFOtest_instance_serial (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
7832025-03-01T00:11:55.930ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = instance_updater elapsed = 65.612\u{b5}s iteration = 1 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
7842025-03-01T00:11:55.930ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = instance_reincarnation iteration = 1 reason = Timeout
7852025-03-01T00:11:55.931ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
7862025-03-01T00:11:55.932ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
7872025-03-01T00:11:55.932ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
7882025-03-01T00:11:55.932ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = service_firewall_rule_propagation iteration = 1 reason = Timeout
7892025-03-01T00:11:55.932ZDEBGtest_instance_serial (service-firewall-rule-progator): starting background task for service firewall rule propagation background_task = service_firewall_rule_propagation
7902025-03-01T00:11:55.932ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
7912025-03-01T00:11:55.932ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7922025-03-01T00:11:55.932ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7932025-03-01T00:11:55.932ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = vpc_route_manager iteration = 1 reason = Timeout
7942025-03-01T00:11:55.935ZINFOtest_instance_serial (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
7952025-03-01T00:11:55.935ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
7962025-03-01T00:11:55.935ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7972025-03-01T00:11:55.935ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
7982025-03-01T00:11:55.935ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
7992025-03-01T00:11:55.935ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
8002025-03-01T00:11:55.935ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 1 reason = Timeout
8012025-03-01T00:11:55.935ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database
8022025-03-01T00:11:55.935ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
8032025-03-01T00:11:55.935ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
8042025-03-01T00:11:55.936ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = saga_recovery iteration = 1 reason = Timeout
8052025-03-01T00:11:55.936ZDEBGtest_instance_serial (SagaRecoverer): listing candidate sagas for recovery
8062025-03-01T00:11:55.936ZTRACtest_instance_serial (SagaRecoverer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database
8072025-03-01T00:11:55.936ZDEBGtest_instance_serial (SagaRecoverer): roles roles = RoleSet { roles: {} }
8082025-03-01T00:11:55.936ZDEBGtest_instance_serial (SagaRecoverer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a, .. }) resource = Database result = Ok(())
8092025-03-01T00:11:55.936ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = lookup_region_port iteration = 1 reason = Timeout
8102025-03-01T00:11:55.936ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database
8112025-03-01T00:11:55.936ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
8122025-03-01T00:11:55.936ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = lookup_region_port resource = Database result = Ok(())
8132025-03-01T00:11:55.936ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 1 reason = Timeout
8142025-03-01T00:11:55.936ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
8152025-03-01T00:11:55.936ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
8162025-03-01T00:11:55.936ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
8172025-03-01T00:11:55.937ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 1 reason = Timeout
8182025-03-01T00:11:55.938ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database
8192025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_snapshot_replacement_garbage_collection roles = RoleSet { roles: {} }
8202025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database result = Ok(())
8212025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 1 reason = Timeout
8222025-03-01T00:11:55.938ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
8232025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
8242025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
8252025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 1 reason = Timeout
8262025-03-01T00:11:55.938ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database
8272025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_snapshot_replacement_finish roles = RoleSet { roles: {} }
8282025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_finish resource = Database result = Ok(())
8292025-03-01T00:11:55.938ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = tuf_artifact_replication iteration = 1 reason = Timeout
8302025-03-01T00:11:55.940ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
8312025-03-01T00:11:55.940ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8322025-03-01T00:11:55.940ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
8332025-03-01T00:11:55.940ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
8342025-03-01T00:11:55.940ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
8352025-03-01T00:11:55.940ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42630 req_id = 2b7f2cb2-1602-42d4-aca6-9979a8d8d23a uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
8362025-03-01T00:11:55.940ZINFOtest_instance_serial (nexus): registered sled agent sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
8372025-03-01T00:11:55.940ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
8382025-03-01T00:11:55.942ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8392025-03-01T00:11:55.942ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
8402025-03-01T00:11:55.942ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
8412025-03-01T00:11:55.942ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
8422025-03-01T00:11:55.942ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
8432025-03-01T00:11:55.942ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8442025-03-01T00:11:55.942ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
8452025-03-01T00:11:55.942ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
8462025-03-01T00:11:55.942ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
8472025-03-01T00:11:55.942ZTRACtest_instance_serial (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 73 2a 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 s*..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:59402 req_id = b9b35b41-69ee-40bf-9c1d-939f7bb62630
8482025-03-01T00:11:55.942ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 29482,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:59402 req_id = b9b35b41-69ee-40bf-9c1d-939f7bb62630
8492025-03-01T00:11:55.942ZERROtest_instance_serial (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 29482, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_nameservice._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 12, 95, 110, 97, 109, 101, 115, 101, 114, 118, 105, 99, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:59402 req_id = b9b35b41-69ee-40bf-9c1d-939f7bb62630
8502025-03-01T00:11:55.943ZTRACtest_instance_serial (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 0c 98 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:56368 req_id = e26690e6-9d5f-444c-a512-dfbc458cafa2
8512025-03-01T00:11:55.943ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 3224,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:56368 req_id = e26690e6-9d5f-444c-a512-dfbc458cafa2
8522025-03-01T00:11:55.943ZERROtest_instance_serial (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 3224, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_external-dns._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 13, 95, 101, 120, 116, 101, 114, 110, 97, 108, 45, 100, 110, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:56368 req_id = e26690e6-9d5f-444c-a512-dfbc458cafa2
8532025-03-01T00:11:55.943ZWARNtest_instance_serial (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_internal dns_group = internal error = no record found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8542025-03-01T00:11:55.943ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 27.048816ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8552025-03-01T00:11:55.943ZWARNtest_instance_serial (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_external dns_group = external error = no record found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8562025-03-01T00:11:55.943ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 25.337502ms iteration = 1 status = {"error":"failed to read list of DNS servers: no record found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8572025-03-01T00:11:55.948ZTRACtest_instance_serial (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8582025-03-01T00:11:55.956ZTRACtest_instance_serial (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 23 f3 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 #............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:63275 req_id = e5492bfc-3ffd-40d0-9956-bcfd6f09a641
8592025-03-01T00:11:55.956ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 9203,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63275 req_id = e5492bfc-3ffd-40d0-9956-bcfd6f09a641
8602025-03-01T00:11:55.957ZERROtest_instance_serial (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 9203, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:63275 req_id = e5492bfc-3ffd-40d0-9956-bcfd6f09a641
8612025-03-01T00:11:55.957ZERROtest_instance_serial (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_v4_garbage_collector error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8622025-03-01T00:11:55.957ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = nat_v4_garbage_collector elapsed = 38.24224ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8632025-03-01T00:11:55.977ZTRACtest_instance_serial (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
8642025-03-01T00:11:56.000ZINFOtest_instance_serial (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2025-03-01 00:01:55.914036999 UTC pruned = {}
8652025-03-01T00:11:56.000ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 64.832294ms iteration = 1 status = {"expiration":"2025-03-01T00:01:55.914036999Z","pruned":[]}
8662025-03-01T00:11:56.000ZTRACtest_instance_serial (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: c0 86 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:52262 req_id = 15e2399a-c901-4383-b9f1-480bd6bde708
8672025-03-01T00:11:56.002ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 49286,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52262 req_id = 15e2399a-c901-4383-b9f1-480bd6bde708
8682025-03-01T00:11:56.002ZERROtest_instance_serial (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 49286, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:52262 req_id = 15e2399a-c901-4383-b9f1-480bd6bde708
8692025-03-01T00:11:56.002ZERROtest_instance_serial (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = no record found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8702025-03-01T00:11:56.002ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = bfd_manager elapsed = 63.110499ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: no record found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8712025-03-01T00:11:56.002ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8722025-03-01T00:11:56.005ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
8732025-03-01T00:11:56.005ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database
8742025-03-01T00:11:56.005ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
8752025-03-01T00:11:56.006ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
8762025-03-01T00:11:56.049ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 130.321885ms iteration = 1 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
8772025-03-01T00:11:56.050ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8782025-03-01T00:11:56.054ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
8792025-03-01T00:11:56.054ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
8802025-03-01T00:11:56.054ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
8812025-03-01T00:11:56.055ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
8822025-03-01T00:11:56.057ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8832025-03-01T00:11:56.067ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
8842025-03-01T00:11:56.067ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database
8852025-03-01T00:11:56.067ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
8862025-03-01T00:11:56.067ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = blueprint_loader resource = Database result = Ok(())
8872025-03-01T00:11:56.106ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8882025-03-01T00:11:56.111ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
8892025-03-01T00:11:56.111ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
8902025-03-01T00:11:56.111ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
8912025-03-01T00:11:56.112ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
8922025-03-01T00:11:56.112ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8932025-03-01T00:11:56.117ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
8942025-03-01T00:11:56.117ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
8952025-03-01T00:11:56.117ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
8962025-03-01T00:11:56.118ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
8972025-03-01T00:11:56.118ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
8982025-03-01T00:11:56.118ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
8992025-03-01T00:11:56.119ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9002025-03-01T00:11:56.119ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9012025-03-01T00:11:56.123ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
9022025-03-01T00:11:56.123ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
9032025-03-01T00:11:56.123ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9042025-03-01T00:11:56.123ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
9052025-03-01T00:11:56.123ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
9062025-03-01T00:11:56.123ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
9072025-03-01T00:11:56.193ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9082025-03-01T00:11:56.198ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Inventory result = Ok(())
9092025-03-01T00:11:56.198ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database
9102025-03-01T00:11:56.198ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_zone_nat_tracker roles = RoleSet { roles: {} }
9112025-03-01T00:11:56.199ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_zone_nat_tracker resource = Database result = Ok(())
9122025-03-01T00:11:56.266ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 339.778937ms iteration = 1 status = {"errors":[],"found_port_ok":[]}
9132025-03-01T00:11:56.269ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9142025-03-01T00:11:56.273ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
9152025-03-01T00:11:56.273ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
9162025-03-01T00:11:56.273ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9172025-03-01T00:11:56.273ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
9182025-03-01T00:11:56.273ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
9192025-03-01T00:11:56.274ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
9202025-03-01T00:11:56.275ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9212025-03-01T00:11:56.288ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Fleet result = Ok(())
9222025-03-01T00:11:56.288ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database
9232025-03-01T00:11:56.289ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
9242025-03-01T00:11:56.289ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_watcher resource = Database result = Ok(())
9252025-03-01T00:11:56.295ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9262025-03-01T00:11:56.303ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
9272025-03-01T00:11:56.303ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database
9282025-03-01T00:11:56.303ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
9292025-03-01T00:11:56.304ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement_driver resource = Database result = Ok(())
9302025-03-01T00:11:56.342ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9312025-03-01T00:11:56.345ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
9322025-03-01T00:11:56.351ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 423.509436ms iteration = 1 status = {"errors":[],"garbage_collect_requested":[]}
9332025-03-01T00:11:56.351ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 422.909739ms iteration = 1 status = {"errors":[],"finish_invoked_ok":[]}
9342025-03-01T00:11:56.360ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = switch_port_config_manager elapsed = 435.492948ms iteration = 1 status = {}
9352025-03-01T00:11:56.360ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
9362025-03-01T00:11:56.360ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9372025-03-01T00:11:56.360ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
9382025-03-01T00:11:56.361ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
9392025-03-01T00:11:56.361ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
9402025-03-01T00:11:56.363ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database
9412025-03-01T00:11:56.363ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
9422025-03-01T00:11:56.364ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_replacement resource = Database result = Ok(())
9432025-03-01T00:11:56.372ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
9442025-03-01T00:11:56.373ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
9452025-03-01T00:11:56.373ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
9462025-03-01T00:11:56.380ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database
9472025-03-01T00:11:56.380ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
9482025-03-01T00:11:56.380ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
9492025-03-01T00:11:56.383ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9502025-03-01T00:11:56.383ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9512025-03-01T00:11:56.389ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9522025-03-01T00:11:56.389ZDEBGtest_instance_serial (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
9532025-03-01T00:11:56.389ZINFOtest_instance_serial (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
9542025-03-01T00:11:56.389ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 459.388792ms iteration = 1 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
9552025-03-01T00:11:56.395ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9562025-03-01T00:11:56.398ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
9572025-03-01T00:11:56.399ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
9582025-03-01T00:11:56.399ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
9592025-03-01T00:11:56.399ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
9602025-03-01T00:11:56.399ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9612025-03-01T00:11:56.403ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
9622025-03-01T00:11:56.404ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
9632025-03-01T00:11:56.404ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
9642025-03-01T00:11:56.405ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
9652025-03-01T00:11:56.418ZINFOtest_instance_serial (SagaRecoverer): listed in-progress sagas count = 0
9662025-03-01T00:11:56.418ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = saga_recovery elapsed = 491.933003ms iteration = 1 status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
9672025-03-01T00:11:56.418ZWARNtest_instance_serial (BackgroundTasks): failed to read target blueprint background_task = blueprint_loader error = Internal Error: no target blueprint set
9682025-03-01T00:11:56.418ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 500.327202ms iteration = 1 status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
9692025-03-01T00:11:56.419ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9702025-03-01T00:11:56.444ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
9712025-03-01T00:11:56.445ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
9722025-03-01T00:11:56.445ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
9732025-03-01T00:11:56.447ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
9742025-03-01T00:11:56.450ZTRACtest_instance_serial (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = instance failed total_found = 0
9752025-03-01T00:11:56.451ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database
9762025-03-01T00:11:56.451ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
9772025-03-01T00:11:56.451ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = instance_reincarnation resource = Database result = Ok(())
9782025-03-01T00:11:56.451ZWARNtest_instance_serial (BackgroundTasks): inventory collection is None background_task = service_zone_nat_tracker
9792025-03-01T00:11:56.451ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 531.274471ms iteration = 1 status = {"error":"inventory collection is None"}
9802025-03-01T00:11:56.452ZDEBGtest_instance_serial (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
9812025-03-01T00:11:56.452ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
9822025-03-01T00:11:56.453ZTRACtest_instance_serial (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: be d6 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:61352 req_id = 270ad187-b2a8-4266-894b-2187c34d5818
9832025-03-01T00:11:56.454ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 48854,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61352 req_id = 270ad187-b2a8-4266-894b-2187c34d5818
9842025-03-01T00:11:56.454ZERROtest_instance_serial (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 48854, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:61352 req_id = 270ad187-b2a8-4266-894b-2187c34d5818
9852025-03-01T00:11:56.462ZWARNtest_instance_serial (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9862025-03-01T00:11:56.463ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 543.268404ms iteration = 1 status = {"error":"failed to collect inventory: looking up MGS addresses: no record found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
9872025-03-01T00:11:56.486ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
9882025-03-01T00:11:56.487ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
9892025-03-01T00:11:56.487ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9902025-03-01T00:11:56.487ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9912025-03-01T00:11:56.488ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9922025-03-01T00:11:56.549ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 626.395116ms iteration = 1 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
9932025-03-01T00:11:56.550ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database
9942025-03-01T00:11:56.550ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
9952025-03-01T00:11:56.551ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
9962025-03-01T00:11:56.589ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 661.473142ms iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
9972025-03-01T00:11:56.625ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
9982025-03-01T00:11:56.625ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
9992025-03-01T00:11:56.625ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10002025-03-01T00:11:56.626ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10012025-03-01T00:11:56.629ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10022025-03-01T00:11:56.629ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10032025-03-01T00:11:56.629ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10042025-03-01T00:11:56.629ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10052025-03-01T00:11:56.643ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10062025-03-01T00:11:56.644ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
10072025-03-01T00:11:56.644ZTRACtest_instance_serial (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
10082025-03-01T00:11:56.644ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
10092025-03-01T00:11:56.644ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
10102025-03-01T00:11:56.644ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10112025-03-01T00:11:56.644ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10122025-03-01T00:11:56.645ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10132025-03-01T00:11:56.656ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet
10142025-03-01T00:11:56.657ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10152025-03-01T00:11:56.657ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
10162025-03-01T00:11:56.657ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
10172025-03-01T00:11:56.658ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
10182025-03-01T00:11:56.659ZINFOtest_instance_serial (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 0 total_failed = 0 total_incomplete = 0 total_instances = 0 update_sagas_queued = 0
10192025-03-01T00:11:56.660ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 736.625557ms iteration = 1 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
10202025-03-01T00:11:56.671ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
10212025-03-01T00:11:56.672ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10222025-03-01T00:11:56.672ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10232025-03-01T00:11:56.680ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10242025-03-01T00:11:56.681ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = inventory_collection iteration = 2 reason = Signaled
10252025-03-01T00:11:56.681ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
10262025-03-01T00:11:56.682ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10272025-03-01T00:11:56.682ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
10282025-03-01T00:11:56.682ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
10292025-03-01T00:11:56.682ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
10302025-03-01T00:11:56.682ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 752187 local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42630 req_id = 2b7f2cb2-1602-42d4-aca6-9979a8d8d23a response_code = 204 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
10312025-03-01T00:11:56.683ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10322025-03-01T00:11:56.687ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
10332025-03-01T00:11:56.687ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database
10342025-03-01T00:11:56.687ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
10352025-03-01T00:11:56.688ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = support_bundle_collector resource = Database result = Ok(())
10362025-03-01T00:11:56.689ZDEBGtest_instance_serial (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:41715/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "2b7f2cb2-1602-42d4-aca6-9979a8d8d23a", "date": "Sat, 01 Mar 2025 00:11:55 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10372025-03-01T00:11:56.689ZDEBGtest_instance_serial (init_with_steps): Running step start_crucible_pantry
10382025-03-01T00:11:56.690ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = GET path = /crucible/pantry/0 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10392025-03-01T00:11:56.690ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = GET path = /crucible/pantry/0/job/{id}/is-finished sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10402025-03-01T00:11:56.691ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = GET path = /crucible/pantry/0/job/{id}/ok sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10412025-03-01T00:11:56.691ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = DELETE path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10422025-03-01T00:11:56.691ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = GET path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10432025-03-01T00:11:56.691ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = POST path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10442025-03-01T00:11:56.691ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = POST path = /crucible/pantry/0/volume/{id}/background sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10452025-03-01T00:11:56.692ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = POST path = /crucible/pantry/0/volume/{id}/bulk-write sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10462025-03-01T00:11:56.692ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = POST path = /crucible/pantry/0/volume/{id}/import-from-url sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10472025-03-01T00:11:56.692ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = POST path = /crucible/pantry/0/volume/{id}/scrub sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10482025-03-01T00:11:56.692ZDEBGtest_instance_serial (dropshot): registered endpoint kind = pantry local_addr = [::1]:34655 method = POST path = /crucible/pantry/0/volume/{id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10492025-03-01T00:11:56.692ZINFOtest_instance_serial (dropshot): listening kind = pantry local_addr = [::1]:34655 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10502025-03-01T00:11:56.692ZDEBGtest_instance_serial (dropshot): successfully registered DTrace USDT probes kind = pantry local_addr = [::1]:34655 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10512025-03-01T00:11:56.692ZINFOtest_instance_serial (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry address = [::1]:34655 kind = pantry sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10522025-03-01T00:11:56.692ZDEBGtest_instance_serial (init_with_steps): Running step populate_internal_dns
10532025-03-01T00:11:56.692ZDEBGtest_instance_serial: Populating Internal DNS
10542025-03-01T00:11:56.788ZINFOtest_instance_serial: DNS population: DnsConfigParams { generation: Generation( 1, ), time_created: 2025-03-01T00:11:56.788510876Z, zones: [ DnsConfigZone { zone_name: "control-plane.oxide.internal", records: { "_crucible-pantry._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 34655, target: "758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal", }, ), ], "56963668-32be-40a0-9656-db179a86c4fe.host": [ Aaaa( ::1, ), ], "_nameservice._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 42817, target: "56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal", }, ), ], "758d4c62-f125-45a8-83d6-22953d8c0fe0.host": [ Aaaa( ::1, ), ], "_clickhouse-native._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 9000, target: "62a82046-a0ff-4d2a-9030-bca63f3c93d9.host.control-plane.oxide.internal", }, ), ], "91c88d5e-9918-41b7-9c23-bbba4cab0734.host": [ Aaaa( ::1, ), ], "_external-dns._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 44469, target: "4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal", }, ), ], "62a82046-a0ff-4d2a-9030-bca63f3c93d9.host": [ Aaaa( ::1, ), ], "_nexus._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 41715, target: "07ece834-ed97-4e95-ace6-eee27c1e42f0.host.control-plane.oxide.internal", }, ), ], "4a162527-5074-4520-add9-9cf6820a1f4a.host": [ Aaaa( ::1, ), ], "_mgd._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 43963, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "_mgs._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 39563, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "_dendrite._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 42103, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "07ece834-ed97-4e95-ace6-eee27c1e42f0.host": [ Aaaa( ::ffff:127.0.0.1, ), ], "_clickhouse._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 44431, target: "62a82046-a0ff-4d2a-9030-bca63f3c93d9.host.control-plane.oxide.internal", }, ), ], "_cockroach._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 32871, target: "91c88d5e-9918-41b7-9c23-bbba4cab0734.host.control-plane.oxide.internal", }, ), ], "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [ Aaaa( ::1, ), ], }, }, ], }
10552025-03-01T00:11:56.789ZDEBGtest_instance_serial: client request body = Some(Body) method = PUT uri = http://[::1]:42817/config
10562025-03-01T00:11:56.790ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10572025-03-01T00:11:56.794ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
10582025-03-01T00:11:56.794ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
10592025-03-01T00:11:56.794ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
10602025-03-01T00:11:56.795ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
10612025-03-01T00:11:56.798ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10622025-03-01T00:11:56.798ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
10632025-03-01T00:11:56.798ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
10642025-03-01T00:11:56.798ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
10652025-03-01T00:11:56.799ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = region_replacement elapsed = 876.678346ms iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
10662025-03-01T00:11:56.799ZWARNtest_instance_serial (BackgroundTasks): failed to read DNS config background_task = dns_config_internal dns_group = internal error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
10672025-03-01T00:11:56.800ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 889.847149ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
10682025-03-01T00:11:56.800ZWARNtest_instance_serial (BackgroundTasks): failed to read DNS config background_task = dns_config_external dns_group = external error = Internal Error: expected exactly one latest version for DNS group External, found 0
10692025-03-01T00:11:56.800ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 887.761474ms iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
10702025-03-01T00:11:56.800ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 871.281054ms iteration = 1 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
10712025-03-01T00:11:56.800ZWARNtest_instance_serial (BackgroundTasks): failed to read Silo/DNS/TLS configuration background_task = external_endpoints error = Internal Error: expected at least one external DNS zone
10722025-03-01T00:11:56.800ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 885.036703ms iteration = 1 status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
10732025-03-01T00:11:56.865ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet
10742025-03-01T00:11:56.865ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10752025-03-01T00:11:56.865ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
10762025-03-01T00:11:56.865ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
10772025-03-01T00:11:56.866ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
10782025-03-01T00:11:56.942ZINFOtest_instance_serial (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
10792025-03-01T00:11:56.943ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:38105/vpc-routes
10802025-03-01T00:11:56.943ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
10812025-03-01T00:11:56.943ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10822025-03-01T00:11:56.944ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
10832025-03-01T00:11:56.945ZTRACtest_instance_serial (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = start saga failed total_found = 0
10842025-03-01T00:11:56.946ZWARNtest_instance_serial (BackgroundTasks): instance reincarnation completed with errors background_task = instance_reincarnation instances_changed_state = 0 instances_found = 0 instances_reincarnated = 0 query_errors = 0 restart_errors = 0
10852025-03-01T00:11:56.946ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = instance_reincarnation elapsed = 1.021826658s iteration = 1 status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
10862025-03-01T00:11:56.946ZINFOtest_instance_serial (http): accepted connection kind = dns local_addr = [::1]:42817 remote_addr = [::1]:42948
10872025-03-01T00:11:56.946ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50024 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10882025-03-01T00:11:56.947ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = GET remote_addr = [::1]:50024 req_id = 380dbb30-a387-476b-9df5-d44fdcf9ca32 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
10892025-03-01T00:11:56.948ZINFOtest_instance_serial (dropshot): request completed latency_us = 659 local_addr = [::1]:38105 method = GET remote_addr = [::1]:50024 req_id = 380dbb30-a387-476b-9df5-d44fdcf9ca32 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
10902025-03-01T00:11:56.948ZTRACtest_instance_serial (http): incoming request kind = dns local_addr = [::1]:42817 method = PUT remote_addr = [::1]:42948 req_id = 5ea9c566-f7f0-4fb4-886c-109eb79b83d5 uri = /config
10912025-03-01T00:11:56.949ZINFOtest_instance_serial (store): attempting generation update new_generation = 1 req_id = 5ea9c566-f7f0-4fb4-886c-109eb79b83d5
10922025-03-01T00:11:56.949ZINFOtest_instance_serial (store): pruning trees for generations newer than 0
10932025-03-01T00:11:56.949ZDEBGtest_instance_serial (store): creating tree tree_name = generation_1_zone_control-plane.oxide.internal
10942025-03-01T00:11:56.950ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:38105/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "380dbb30-a387-476b-9df5-d44fdcf9ca32", "content-length": "2", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
10952025-03-01T00:11:56.951ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
10962025-03-01T00:11:56.951ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
10972025-03-01T00:11:56.952ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
10982025-03-01T00:11:56.955ZDEBGtest_instance_serial (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
10992025-03-01T00:11:56.955ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
11002025-03-01T00:11:56.957ZDEBGtest_instance_serial (store): updating current config
11012025-03-01T00:11:56.958ZDEBGtest_instance_serial (store): flushing default tree
11022025-03-01T00:11:56.959ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11032025-03-01T00:11:56.978ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
11042025-03-01T00:11:56.978ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11052025-03-01T00:11:56.978ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11062025-03-01T00:11:56.979ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11072025-03-01T00:11:56.980ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11082025-03-01T00:11:56.984ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
11092025-03-01T00:11:56.984ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database
11102025-03-01T00:11:56.984ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
11112025-03-01T00:11:56.985ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
11122025-03-01T00:11:56.988ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11132025-03-01T00:11:56.988ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11142025-03-01T00:11:56.991ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11152025-03-01T00:11:56.993ZINFOtest_instance_serial (store): pruning trees for generations older than 1 keep = 3
11162025-03-01T00:11:56.994ZINFOtest_instance_serial (store): updated generation new_generation = 1 req_id = 5ea9c566-f7f0-4fb4-886c-109eb79b83d5
11172025-03-01T00:11:56.994ZINFOtest_instance_serial (http): request completed kind = dns latency_us = 45056 local_addr = [::1]:42817 method = PUT remote_addr = [::1]:42948 req_id = 5ea9c566-f7f0-4fb4-886c-109eb79b83d5 response_code = 204 uri = /config
11182025-03-01T00:11:57.028ZTRACtest_instance_serial (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 03 d1 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:63540 req_id = e1a90ff5-222c-4a7e-a305-e082d45ad5ff
11192025-03-01T00:11:57.028ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 977,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63540 req_id = e1a90ff5-222c-4a7e-a305-e082d45ad5ff
11202025-03-01T00:11:57.029ZDEBGtest_instance_serial (store): query key key = _mgs._tcp
11212025-03-01T00:11:57.029ZDEBGtest_instance_serial (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
11222025-03-01T00:11:57.029ZDEBGtest_instance_serial (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:63540 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39563, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = e1a90ff5-222c-4a7e-a305-e082d45ad5ff
11232025-03-01T00:11:57.030ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11242025-03-01T00:11:57.030ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11252025-03-01T00:11:57.042ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11262025-03-01T00:11:57.043ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication body = None method = GET uri = http://[::1]:38105/artifacts
11272025-03-01T00:11:57.043ZDEBGtest_instance_serial: client response result = Ok(Response { url: "http://[::1]:42817/config", status: 204, headers: {"x-request-id": "5ea9c566-f7f0-4fb4-886c-109eb79b83d5", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
11282025-03-01T00:11:57.046ZDEBGtest_instance_serial (init_with_steps): Running step configure_sled_agents
11292025-03-01T00:11:57.090ZDEBGtest_instance_serial: client request body = Some(Body) method = PUT uri = http://[::1]:38105/omicron-zones
11302025-03-01T00:11:57.098ZDEBGtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39563, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 1986, tv_nsec: 858371676 } })
11312025-03-01T00:11:57.099ZTRACtest_instance_serial (DnsResolver): lookup_service_targets: looking up SRV target
11322025-03-01T00:11:57.106ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50026 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11332025-03-01T00:11:57.107ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50028 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
11342025-03-01T00:11:57.109ZINFOtest_instance_serial (BackgroundTasks): No bundles to collect background_task = support_bundle_collector
11352025-03-01T00:11:57.109ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = support_bundle_collector elapsed = 1.189514859s iteration = 1 status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
11362025-03-01T00:11:57.111ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = GET remote_addr = [::1]:50026 req_id = e8b1f1fa-c24e-4009-bb07-98ae8bbe9bd6 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts
11372025-03-01T00:11:57.117ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11382025-03-01T00:11:57.117ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11392025-03-01T00:11:57.118ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11402025-03-01T00:11:57.125ZINFOtest_instance_serial (dropshot): request completed latency_us = 14793 local_addr = [::1]:38105 method = GET remote_addr = [::1]:50026 req_id = e8b1f1fa-c24e-4009-bb07-98ae8bbe9bd6 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts
11412025-03-01T00:11:57.126ZTRACtest_instance_serial (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 1a f3 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:50244 req_id = 199abc2e-5ada-457b-bfc8-6ebff6e7928a
11422025-03-01T00:11:57.127ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 6899,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:50244 req_id = 199abc2e-5ada-457b-bfc8-6ebff6e7928a
11432025-03-01T00:11:57.128ZDEBGtest_instance_serial (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
11442025-03-01T00:11:57.128ZDEBGtest_instance_serial (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:50244 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 199abc2e-5ada-457b-bfc8-6ebff6e7928a
11452025-03-01T00:11:57.128ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication result = Ok(Response { url: "http://[::1]:38105/artifacts", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8b1f1fa-c24e-4009-bb07-98ae8bbe9bd6", "content-length": "2", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
11462025-03-01T00:11:57.128ZINFOtest_instance_serial (BackgroundTasks): Successfully got artifact list background_task = tuf_artifact_replication sled = http://[::1]:38105
11472025-03-01T00:11:57.147ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = tuf_artifact_replication elapsed = 1.216824492s iteration = 1 status = {"last_run_counters":{"copy_err":0,"copy_ok":0,"delete_err":0,"delete_ok":0,"list_err":0,"list_ok":1,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"delete_err":0,"delete_ok":0,"list_err":0,"list_ok":1,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[{"operation":"list","target_sled":"b6d65341-167c-41df-9b5c-41cded99c229","time":"2025-03-01T00:11:57.127472252Z"}]}
11482025-03-01T00:11:57.152ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50028 req_id = 9085a0b2-796c-4113-8d7c-b9d0ef2cde50 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
11492025-03-01T00:11:57.223ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
11502025-03-01T00:11:57.229ZINFOtest_instance_serial (dropshot): request completed latency_us = 75881 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50028 req_id = 9085a0b2-796c-4113-8d7c-b9d0ef2cde50 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-zones
11512025-03-01T00:11:57.233ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
11522025-03-01T00:11:57.234ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
11532025-03-01T00:11:57.234ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11542025-03-01T00:11:57.234ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11552025-03-01T00:11:57.234ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11562025-03-01T00:11:57.234ZINFOtest_instance_serial (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = sim-b6d65341
11572025-03-01T00:11:57.234ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:38105/eip-gateways
11582025-03-01T00:11:57.235ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50024 req_id = 42d00952-dc44-4bf7-aea5-4d7099ddda23 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
11592025-03-01T00:11:57.235ZINFOtest_instance_serial (dropshot): request completed latency_us = 203 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50024 req_id = 42d00952-dc44-4bf7-aea5-4d7099ddda23 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
11602025-03-01T00:11:57.235ZDEBGtest_instance_serial: client response result = Ok(Response { url: "http://[::1]:38105/omicron-zones", status: 204, headers: {"x-request-id": "9085a0b2-796c-4113-8d7c-b9d0ef2cde50", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
11612025-03-01T00:11:57.235ZDEBGtest_instance_serial: client request body = Some(Body) method = PUT uri = http://[::1]:38105/network-bootstore-config
11622025-03-01T00:11:57.235ZTRACtest_instance_serial (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 76 1a 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c v............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:61195 req_id = cfd9823e-3086-4f68-b659-b27c39468a18
11632025-03-01T00:11:57.235ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 30234,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:61195 req_id = cfd9823e-3086-4f68-b659-b27c39468a18
11642025-03-01T00:11:57.235ZDEBGtest_instance_serial (store): query key key = _clickhouse-admin-keeper._tcp
11652025-03-01T00:11:57.235ZERROtest_instance_serial (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 30234, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:61195 req_id = cfd9823e-3086-4f68-b659-b27c39468a18
11662025-03-01T00:11:57.237ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:38105/eip-gateways", status: 204, headers: {"x-request-id": "42d00952-dc44-4bf7-aea5-4d7099ddda23", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
11672025-03-01T00:11:57.238ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 1.313244621s iteration = 1 status = {}
11682025-03-01T00:11:57.239ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
11692025-03-01T00:11:57.239ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11702025-03-01T00:11:57.239ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11712025-03-01T00:11:57.240ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11722025-03-01T00:11:57.240ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50028 req_id = 19a69930-6fc6-42b0-9100-afe48c243447 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
11732025-03-01T00:11:57.240ZDEBGtest_instance_serial (BackgroundTasks): begin collection background_task = inventory_collection
11742025-03-01T00:11:57.246ZDEBGtest_instance_serial (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39563
11752025-03-01T00:11:57.246ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/ignition
11762025-03-01T00:11:57.247ZINFOtest_instance_serial (dropshot): request completed latency_us = 1199 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50028 req_id = 19a69930-6fc6-42b0-9100-afe48c243447 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
11772025-03-01T00:11:57.280ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11782025-03-01T00:11:57.280ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11792025-03-01T00:11:57.281ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11802025-03-01T00:11:57.281ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11812025-03-01T00:11:57.281ZDEBGtest_instance_serial: client response result = Ok(Response { url: "http://[::1]:38105/network-bootstore-config", status: 204, headers: {"x-request-id": "19a69930-6fc6-42b0-9100-afe48c243447", "date": "Sat, 01 Mar 2025 00:11:56 GMT"} })
11822025-03-01T00:11:57.282ZDEBGtest_instance_serial (init_with_steps): Running step start_nexus_external
11832025-03-01T00:11:57.282ZDEBGtest_instance_serial: Starting Nexus (external API)
11842025-03-01T00:11:58.373ZTRACtest_instance_serial (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
11852025-03-01T00:11:58.373ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11862025-03-01T00:11:58.373ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
11872025-03-01T00:11:58.373ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
11882025-03-01T00:11:58.374ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
11892025-03-01T00:11:58.375ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
11902025-03-01T00:11:58.376ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11912025-03-01T00:11:58.376ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
11922025-03-01T00:11:58.376ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
11932025-03-01T00:11:58.377ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
11942025-03-01T00:11:58.378ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11952025-03-01T00:11:58.385ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
11962025-03-01T00:11:58.386ZTRACtest_instance_serial (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
11972025-03-01T00:11:58.386ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
11982025-03-01T00:11:58.386ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11992025-03-01T00:11:58.386ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12002025-03-01T00:11:58.389ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12012025-03-01T00:11:58.393ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
12022025-03-01T00:11:58.394ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
12032025-03-01T00:11:58.394ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12042025-03-01T00:11:58.394ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
12052025-03-01T00:11:58.394ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
12062025-03-01T00:11:58.395ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
12072025-03-01T00:11:58.395ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12082025-03-01T00:11:58.395ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12092025-03-01T00:11:58.396ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12102025-03-01T00:11:58.396ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12112025-03-01T00:11:58.399ZDEBGtest_instance_serial (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
12122025-03-01T00:11:58.399ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12132025-03-01T00:11:58.399ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
12142025-03-01T00:11:58.400ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12152025-03-01T00:11:58.401ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12162025-03-01T00:11:58.405ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
12172025-03-01T00:11:58.405ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
12182025-03-01T00:11:58.405ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
12192025-03-01T00:11:58.406ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
12202025-03-01T00:11:58.409ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "99f5e0b1-d662-42d6-97d0-a045bce4d4f0", "content-length": "835", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
12212025-03-01T00:11:58.410ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0
12222025-03-01T00:11:58.411ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12232025-03-01T00:11:58.411ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12242025-03-01T00:11:58.411ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12252025-03-01T00:11:58.417ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12262025-03-01T00:11:58.417ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
12272025-03-01T00:11:58.418ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12282025-03-01T00:11:58.419ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12292025-03-01T00:11:58.419ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12302025-03-01T00:11:58.420ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12312025-03-01T00:11:58.431ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5ef37165-949e-44d3-96dd-e63c2c4b3c41", "content-length": "734", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
12322025-03-01T00:11:58.431ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=0
12332025-03-01T00:11:58.432ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
12342025-03-01T00:11:58.432ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12352025-03-01T00:11:58.432ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12362025-03-01T00:11:58.432ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12372025-03-01T00:11:58.433ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12382025-03-01T00:11:58.435ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12392025-03-01T00:11:58.436ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12402025-03-01T00:11:58.436ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12412025-03-01T00:11:58.436ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12422025-03-01T00:11:58.442ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12432025-03-01T00:11:58.442ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12442025-03-01T00:11:58.443ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12452025-03-01T00:11:58.443ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12462025-03-01T00:11:58.444ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12472025-03-01T00:11:58.456ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
12482025-03-01T00:11:58.457ZTRACtest_instance_serial (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
12492025-03-01T00:11:58.457ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
12502025-03-01T00:11:58.457ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12512025-03-01T00:11:58.458ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12522025-03-01T00:11:58.458ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12532025-03-01T00:11:58.458ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12542025-03-01T00:11:58.464ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12552025-03-01T00:11:58.464ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12562025-03-01T00:11:58.464ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12572025-03-01T00:11:58.465ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12582025-03-01T00:11:58.467ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12592025-03-01T00:11:58.467ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12602025-03-01T00:11:58.468ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12612025-03-01T00:11:58.468ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12622025-03-01T00:11:58.469ZINFOtest_instance_serial (InternalApi): set cockroachdb setting setting = cluster.preserve_downgrade_option value = 22.1
12632025-03-01T00:11:58.470ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12642025-03-01T00:11:58.470ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
12652025-03-01T00:11:58.470ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12662025-03-01T00:11:58.472ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12672025-03-01T00:11:58.481ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
12682025-03-01T00:11:58.481ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12692025-03-01T00:11:58.481ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12702025-03-01T00:11:58.482ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12712025-03-01T00:11:58.488ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
12722025-03-01T00:11:58.488ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12732025-03-01T00:11:58.488ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12742025-03-01T00:11:58.489ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
12752025-03-01T00:11:58.489ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12762025-03-01T00:11:58.507ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12772025-03-01T00:11:58.512ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
12782025-03-01T00:11:58.512ZDEBGtest_instance_serial (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some( V6( Ipv6Network { addr: fd00:1122:3344:100::, prefix: 56, }, ), )
12792025-03-01T00:11:58.512ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
12802025-03-01T00:11:58.512ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
12812025-03-01T00:11:58.516ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
12822025-03-01T00:11:58.519ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12832025-03-01T00:11:58.519ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12842025-03-01T00:11:58.519ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12852025-03-01T00:11:58.519ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0c42b548-d2ca-485f-8dcd-06f47805fca3", "content-length": "111", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
12862025-03-01T00:11:58.519ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=1
12872025-03-01T00:11:58.522ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f213be0a-bae3-4fdf-b366-dce678e64369", "content-length": "111", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
12882025-03-01T00:11:58.522ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=0
12892025-03-01T00:11:58.524ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f58e865a-4378-41c5-b0d9-1b281705fe46", "content-length": "167", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
12902025-03-01T00:11:58.524ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=1
12912025-03-01T00:11:58.529ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
12922025-03-01T00:11:58.529ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12932025-03-01T00:11:58.535ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12942025-03-01T00:11:58.536ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "946ae855-ab11-48c0-a3e3-760c2cdde688", "content-length": "167", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
12952025-03-01T00:11:58.536ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=0
12962025-03-01T00:11:58.537ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9cb1af1-f9e6-479f-80eb-007b94ff3d61", "content-length": "175", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
12972025-03-01T00:11:58.540ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=1
12982025-03-01T00:11:58.540ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e2b4d8fe-c2b5-40b1-8c4c-251429f4b453", "content-length": "175", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
12992025-03-01T00:11:58.540ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/cmpa
13002025-03-01T00:11:58.540ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13012025-03-01T00:11:58.540ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13022025-03-01T00:11:58.540ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13032025-03-01T00:11:58.544ZINFOtest_instance_serial (InternalApi): Using static configuration for external switchports
13042025-03-01T00:11:58.545ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13052025-03-01T00:11:58.545ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
13062025-03-01T00:11:58.545ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13072025-03-01T00:11:58.545ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c114f0ac-da79-4274-9979-31c681deb2db", "content-length": "702", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13082025-03-01T00:11:58.557ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
13092025-03-01T00:11:58.557ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13102025-03-01T00:11:58.558ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13112025-03-01T00:11:58.558ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13122025-03-01T00:11:58.559ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "03124240-d149-4e7d-a9ca-b89f38ff157c", "content-length": "727", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13132025-03-01T00:11:58.560ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
13142025-03-01T00:11:58.561ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d884f582-dc57-44f2-983a-fc4490ae93fa", "content-length": "729", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13152025-03-01T00:11:58.561ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
13162025-03-01T00:11:58.562ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5b630d81-c70e-4d11-890b-bddb7036f7a8", "content-length": "728", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13172025-03-01T00:11:58.563ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1
13182025-03-01T00:11:58.563ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
13192025-03-01T00:11:58.564ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
13202025-03-01T00:11:58.564ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13212025-03-01T00:11:58.564ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13222025-03-01T00:11:58.564ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13232025-03-01T00:11:58.564ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "75dd8c57-8f2b-4193-8a86-1f53e9ddd94f", "content-length": "734", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13242025-03-01T00:11:58.564ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=0
13252025-03-01T00:11:58.565ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13262025-03-01T00:11:58.565ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13272025-03-01T00:11:58.565ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13282025-03-01T00:11:58.565ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13292025-03-01T00:11:58.567ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2ddf0509-1d05-4639-a964-611e5c236bea", "content-length": "111", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13302025-03-01T00:11:58.567ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=1
13312025-03-01T00:11:58.569ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13322025-03-01T00:11:58.570ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13332025-03-01T00:11:58.570ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13342025-03-01T00:11:58.570ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13352025-03-01T00:11:58.578ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fea1fec9-ee3c-4488-85c0-0c22af551383", "content-length": "111", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13362025-03-01T00:11:58.579ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=0
13372025-03-01T00:11:58.579ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13382025-03-01T00:11:58.588ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
13392025-03-01T00:11:58.588ZTRACtest_instance_serial (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
13402025-03-01T00:11:58.588ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
13412025-03-01T00:11:58.588ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
13422025-03-01T00:11:58.589ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13432025-03-01T00:11:58.589ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13442025-03-01T00:11:58.589ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13452025-03-01T00:11:58.591ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13462025-03-01T00:11:58.591ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13472025-03-01T00:11:58.592ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13482025-03-01T00:11:58.593ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13492025-03-01T00:11:58.594ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f4f0411-4aeb-4ede-8ccc-10a33457e546", "content-length": "167", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13502025-03-01T00:11:58.595ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=1
13512025-03-01T00:11:58.595ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13522025-03-01T00:11:58.595ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13532025-03-01T00:11:58.595ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13542025-03-01T00:11:58.598ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13552025-03-01T00:11:58.676ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:38105/v2p
13562025-03-01T00:11:58.677ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13572025-03-01T00:11:58.694ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
13582025-03-01T00:11:58.694ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13592025-03-01T00:11:58.694ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13602025-03-01T00:11:58.696ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13612025-03-01T00:11:58.697ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50030 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13622025-03-01T00:11:58.698ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = GET remote_addr = [::1]:50030 req_id = 0d149630-dfcd-4e88-8e35-ad0ce937f6e1 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
13632025-03-01T00:11:58.698ZINFOtest_instance_serial (dropshot): request completed latency_us = 318 local_addr = [::1]:38105 method = GET remote_addr = [::1]:50030 req_id = 0d149630-dfcd-4e88-8e35-ad0ce937f6e1 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
13642025-03-01T00:11:58.698ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:38105/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "0d149630-dfcd-4e88-8e35-ad0ce937f6e1", "content-length": "2", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13652025-03-01T00:11:58.699ZINFOtest_instance_serial (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-b6d65341
13662025-03-01T00:11:58.699ZINFOtest_instance_serial (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
13672025-03-01T00:11:58.699ZINFOtest_instance_serial (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = sim-b6d65341
13682025-03-01T00:11:58.700ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 2.778563936s iteration = 1 status = {}
13692025-03-01T00:11:58.703ZINFOtest_instance_serial (InternalApi): Recording Rack Network Configuration
13702025-03-01T00:11:58.705ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
13712025-03-01T00:11:58.705ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
13722025-03-01T00:11:58.705ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
13732025-03-01T00:11:58.706ZDEBGtest_instance_serial (service-firewall-rule-progator): resolved names for firewall rules background_task = service_firewall_rule_propagation instance_interfaces = {} subnet_interfaces = {} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
13742025-03-01T00:11:58.706ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet
13752025-03-01T00:11:58.706ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13762025-03-01T00:11:58.706ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13772025-03-01T00:11:58.707ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13782025-03-01T00:11:58.707ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13792025-03-01T00:11:58.710ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13802025-03-01T00:11:58.715ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Fleet result = Ok(())
13812025-03-01T00:11:58.721ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database
13822025-03-01T00:11:58.721ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13832025-03-01T00:11:58.721ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13842025-03-01T00:11:58.727ZTRACtest_instance_serial (service-firewall-rule-progator): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-02-28T23:51:58.927566Z, time_modified: 2025-02-28T23:51:58.927566Z, allowed_ips: None } background_task = service_firewall_rule_propagation
13852025-03-01T00:11:58.727ZDEBGtest_instance_serial (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified. background_task = service_firewall_rule_propagation
13862025-03-01T00:11:58.727ZDEBGtest_instance_serial (service-firewall-rule-progator): resolved firewall rules for sled agents background_task = service_firewall_rule_propagation sled_agent_rules = []
13872025-03-01T00:11:58.727ZDEBGtest_instance_serial (service-firewall-rule-progator): resolved 0 rules for sleds background_task = service_firewall_rule_propagation
13882025-03-01T00:11:58.754ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b3c71ae1-63fc-436b-893b-df2ae768b38a", "content-length": "167", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13892025-03-01T00:11:58.756ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=0
13902025-03-01T00:11:58.772ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4ceba6f4-dbc1-40b9-9e13-8aadfc9d9b90", "content-length": "175", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13912025-03-01T00:11:58.773ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=1
13922025-03-01T00:11:58.773ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8e8819e7-3d80-45c4-96fc-22b6b2a7ed23", "content-length": "175", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13932025-03-01T00:11:58.774ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/cmpa
13942025-03-01T00:11:58.784ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6088745d-ad7f-48d7-b46c-39d965056bb2", "content-length": "702", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13952025-03-01T00:11:58.785ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
13962025-03-01T00:11:58.785ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "46e19603-ccf3-4c12-b63a-9a2939439a87", "content-length": "727", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13972025-03-01T00:11:58.785ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
13982025-03-01T00:11:58.785ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ce7409bb-9c48-40b0-bb8e-7d0644ce2b87", "content-length": "729", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
13992025-03-01T00:11:58.785ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
14002025-03-01T00:11:58.785ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ff4f436d-d2fb-4093-8006-7e72edf40000", "content-length": "728", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14012025-03-01T00:11:58.785ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0
14022025-03-01T00:11:58.786ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4c9b365d-7a16-49a3-8c4e-4230dc9f3775", "content-length": "723", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14032025-03-01T00:11:58.792ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=0
14042025-03-01T00:11:58.792ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1555431e-f180-48eb-a7d4-abe1f7acb04c", "content-length": "109", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14052025-03-01T00:11:58.792ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=1
14062025-03-01T00:11:58.792ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "27f3b9b9-4024-4ff2-a88a-932533fbc74e", "content-length": "109", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14072025-03-01T00:11:58.792ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=0
14082025-03-01T00:11:58.793ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "736032b3-a44b-4bae-9e7a-b11c92ef3f51", "content-length": "169", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14092025-03-01T00:11:58.794ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=1
14102025-03-01T00:11:58.796ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "869b6e77-80a1-4349-aef5-c416d08b3b32", "content-length": "169", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14112025-03-01T00:11:58.797ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=0
14122025-03-01T00:11:58.799ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b21d3c63-6a57-4dfc-9639-83f43e7b778d", "content-length": "178", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14132025-03-01T00:11:58.799ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=1
14142025-03-01T00:11:58.799ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "046a6d5d-1944-4c07-8b6a-bd616bba4096", "content-length": "178", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14152025-03-01T00:11:58.799ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/cmpa
14162025-03-01T00:11:58.799ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f397c7ef-9693-4cc7-82d4-65984e4e8448", "content-length": "702", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14172025-03-01T00:11:58.799ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
14182025-03-01T00:11:58.803ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8a90eb3f-85c6-459a-8537-b06920b38fe7", "content-length": "727", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14192025-03-01T00:11:58.803ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
14202025-03-01T00:11:58.806ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c0c34ea4-9c5c-4816-8e44-12417accc070", "content-length": "729", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14212025-03-01T00:11:58.807ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
14222025-03-01T00:11:58.807ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a4283e86-61e3-4ed0-ba0e-3f157a4fff67", "content-length": "728", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14232025-03-01T00:11:58.807ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1
14242025-03-01T00:11:58.808ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f22266dc-8404-427e-830c-ab2de0d6ceaa", "content-length": "723", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14252025-03-01T00:11:58.809ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=0
14262025-03-01T00:11:58.810ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "68f9291c-4b5d-441d-8cb3-bbcaf58d1c5d", "content-length": "109", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14272025-03-01T00:11:58.810ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=1
14282025-03-01T00:11:58.812ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "459a9e70-22d7-4cc7-bec0-073b2bdae443", "content-length": "109", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14292025-03-01T00:11:58.812ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=0
14302025-03-01T00:11:58.813ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "186517f1-3744-4276-adb8-e74a91aa74d9", "content-length": "169", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14312025-03-01T00:11:58.814ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=1
14322025-03-01T00:11:58.816ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "585c1058-c3fd-4556-800d-ce6b2e4693da", "content-length": "169", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14332025-03-01T00:11:58.816ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=0
14342025-03-01T00:11:58.817ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f15a7f9-c585-4478-a832-7dd51bc8cee4", "content-length": "178", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14352025-03-01T00:11:58.818ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=1
14362025-03-01T00:11:58.820ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c9b25d38-944a-4f97-abc1-02fcfb62ca56", "content-length": "178", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14372025-03-01T00:11:58.820ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/cmpa
14382025-03-01T00:11:58.820ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "08cd2844-6d77-4544-8b24-30812e1a7fb3", "content-length": "702", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14392025-03-01T00:11:58.820ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
14402025-03-01T00:11:58.821ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a7058d4b-9802-4878-b802-723547c98b6e", "content-length": "727", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14412025-03-01T00:11:58.822ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
14422025-03-01T00:11:58.822ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "aa458e4b-7a75-4b04-80b4-766f827eedda", "content-length": "729", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14432025-03-01T00:11:58.822ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
14442025-03-01T00:11:58.824ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8fa8872-c63a-4421-a6b0-b74b2c92936e", "content-length": "728", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14452025-03-01T00:11:58.826ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
14462025-03-01T00:11:58.826ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14472025-03-01T00:11:58.826ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14482025-03-01T00:11:58.826ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14492025-03-01T00:11:58.826ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14502025-03-01T00:11:58.830ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14512025-03-01T00:11:58.834ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
14522025-03-01T00:11:58.841ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
14532025-03-01T00:11:58.841ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14542025-03-01T00:11:58.841ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14552025-03-01T00:11:58.841ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14562025-03-01T00:11:58.841ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14572025-03-01T00:11:58.841ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14582025-03-01T00:11:58.844ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
14592025-03-01T00:11:58.844ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14602025-03-01T00:11:58.844ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14612025-03-01T00:11:58.845ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14622025-03-01T00:11:58.889ZDEBGtest_instance_serial (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:38105
14632025-03-01T00:11:58.889ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = http://[::1]:38105 background_task = inventory_collection body = None method = GET uri = http://[::1]:38105/inventory
14642025-03-01T00:11:58.890ZDEBGtest_instance_serial (service-firewall-rule-progator): resolved sleds for vpc oxide-services background_task = service_firewall_rule_propagation vpc_to_sled = []
14652025-03-01T00:11:58.890ZDEBGtest_instance_serial (service-firewall-rule-progator): sending firewall rules to sled agents background_task = service_firewall_rule_propagation
14662025-03-01T00:11:58.890ZINFOtest_instance_serial (service-firewall-rule-progator): updated firewall rules on 0 sleds background_task = service_firewall_rule_propagation
14672025-03-01T00:11:58.890ZDEBGtest_instance_serial (service-firewall-rule-progator): successfully propagated service firewall rules background_task = service_firewall_rule_propagation elapsed = 2.965326935s
14682025-03-01T00:11:58.890ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = service_firewall_rule_propagation elapsed = 2.965361976s iteration = 1 status = {}
14692025-03-01T00:11:58.890ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50034 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14702025-03-01T00:11:58.891ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = GET remote_addr = [::1]:50034 req_id = 476609cf-7b84-4f2b-9c9a-79d20bac683f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
14712025-03-01T00:11:58.891ZINFOtest_instance_serial (dropshot): request completed latency_us = 374 local_addr = [::1]:38105 method = GET remote_addr = [::1]:50034 req_id = 476609cf-7b84-4f2b-9c9a-79d20bac683f response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
14722025-03-01T00:11:58.891ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = http://[::1]:38105 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:38105/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "476609cf-7b84-4f2b-9c9a-79d20bac683f", "content-length": "2517", "date": "Sat, 01 Mar 2025 00:11:58 GMT"} })
14732025-03-01T00:11:58.893ZDEBGtest_instance_serial (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
14742025-03-01T00:11:58.894ZDEBGtest_instance_serial (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
14752025-03-01T00:11:58.894ZDEBGtest_instance_serial (BackgroundTasks): finished collection background_task = inventory_collection
14762025-03-01T00:11:58.894ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
14772025-03-01T00:11:58.894ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14782025-03-01T00:11:58.895ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14792025-03-01T00:11:58.895ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14802025-03-01T00:11:58.895ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14812025-03-01T00:11:58.896ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14822025-03-01T00:11:58.901ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
14832025-03-01T00:11:58.902ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
14842025-03-01T00:11:58.902ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
14852025-03-01T00:11:58.902ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
14862025-03-01T00:11:58.953ZTRACtest_instance_serial (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
14872025-03-01T00:11:58.955ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14882025-03-01T00:11:58.955ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14892025-03-01T00:11:58.955ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
14902025-03-01T00:11:58.955ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14912025-03-01T00:11:58.957ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14922025-03-01T00:11:58.961ZDEBGtest_instance_serial (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
14932025-03-01T00:11:58.961ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14942025-03-01T00:11:58.961ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
14952025-03-01T00:11:58.962ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
14962025-03-01T00:11:58.966ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
14972025-03-01T00:11:58.967ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14982025-03-01T00:11:58.967ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
14992025-03-01T00:11:58.967ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15002025-03-01T00:11:58.967ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15012025-03-01T00:11:58.969ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15022025-03-01T00:11:58.976ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") } result = Ok(())
15032025-03-01T00:11:58.977ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15042025-03-01T00:11:58.977ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15052025-03-01T00:11:58.977ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15062025-03-01T00:11:58.979ZTRACtest_instance_serial (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
15072025-03-01T00:11:58.980ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15082025-03-01T00:11:58.980ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15092025-03-01T00:11:58.980ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15102025-03-01T00:11:58.980ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15112025-03-01T00:11:58.982ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15122025-03-01T00:11:58.986ZDEBGtest_instance_serial (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") } result = Ok(())
15132025-03-01T00:11:59.056ZTRACtest_instance_serial (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") }
15142025-03-01T00:11:59.056ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15152025-03-01T00:11:59.056ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15162025-03-01T00:11:59.057ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15172025-03-01T00:11:59.057ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15182025-03-01T00:11:59.059ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15192025-03-01T00:11:59.065ZDEBGtest_instance_serial (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = IpPool { parent: Fleet, key: b9fd5c95-e5d0-47ee-aa14-0af4e6a3ccd6, lookup_type: ByName("oxide-service-pool") } result = Ok(())
15202025-03-01T00:11:59.076ZTRACtest_instance_serial (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
15212025-03-01T00:11:59.076ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15222025-03-01T00:11:59.076ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15232025-03-01T00:11:59.076ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15242025-03-01T00:11:59.079ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15252025-03-01T00:11:59.081ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15262025-03-01T00:11:59.092ZDEBGtest_instance_serial (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
15272025-03-01T00:11:59.636ZINFOtest_instance_serial (InternalApi): inserted blueprint blueprint_id = 3a246063-0482-421d-9e0b-524e1fe8c575
15282025-03-01T00:11:59.636ZTRACtest_instance_serial (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig
15292025-03-01T00:11:59.636ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15302025-03-01T00:11:59.636ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15312025-03-01T00:11:59.636ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15322025-03-01T00:11:59.637ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15332025-03-01T00:11:59.639ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15342025-03-01T00:11:59.644ZDEBGtest_instance_serial (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = BlueprintConfig result = Ok(())
15352025-03-01T00:11:59.742ZINFOtest_instance_serial (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 5702d944-2c62-46b6-8f7d-27d83b7977da
15362025-03-01T00:11:59.743ZDEBGtest_instance_serial (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 5702d944-2c62-46b6-8f7d-27d83b7977da time_started = 2025-03-01 00:11:57.240809 UTC
15372025-03-01T00:11:59.743ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 3.061379675s iteration = 2 status = {"collection_id":"5702d944-2c62-46b6-8f7d-27d83b7977da","time_done":"2025-03-01 00:11:58.892782 UTC","time_started":"2025-03-01 00:11:57.240809 UTC"}
15382025-03-01T00:11:59.743ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 2 reason = Dependency
15392025-03-01T00:11:59.743ZWARNtest_instance_serial (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
15402025-03-01T00:11:59.743ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 60.632\u{b5}s iteration = 2 status = {"error":"no blueprint"}
15412025-03-01T00:11:59.743ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 2 reason = Dependency
15422025-03-01T00:11:59.743ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 10.97\u{b5}s iteration = 2 status = {"error":"task disabled"}
15432025-03-01T00:11:59.747ZINFOtest_instance_serial (InternalApi): Inserted networking records for nexus service
15442025-03-01T00:11:59.776ZINFOtest_instance_serial (InternalApi): Inserted networking records for external_dns service
15452025-03-01T00:11:59.776ZINFOtest_instance_serial (InternalApi): No networking records needed for internal_dns service
15462025-03-01T00:11:59.776ZINFOtest_instance_serial (InternalApi): No networking records needed for clickhouse service
15472025-03-01T00:11:59.776ZINFOtest_instance_serial (InternalApi): No networking records needed for crucible_pantry service
15482025-03-01T00:11:59.776ZINFOtest_instance_serial (InternalApi): No networking records needed for cockroach_db service
15492025-03-01T00:11:59.777ZINFOtest_instance_serial (InternalApi): Inserted service networking records
15502025-03-01T00:11:59.777ZINFOtest_instance_serial (InternalApi): Inserted physical disks
15512025-03-01T00:11:59.777ZINFOtest_instance_serial (InternalApi): Inserted zpools
15522025-03-01T00:11:59.777ZINFOtest_instance_serial (InternalApi): Inserted datasets
15532025-03-01T00:11:59.812ZINFOtest_instance_serial (InternalApi): Populated DNS tables for internal DNS
15542025-03-01T00:11:59.817ZINFOtest_instance_serial (InternalApi): Populated DNS tables for external DNS
15552025-03-01T00:11:59.817ZTRACtest_instance_serial (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15562025-03-01T00:11:59.817ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15572025-03-01T00:11:59.818ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15582025-03-01T00:11:59.818ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15592025-03-01T00:11:59.818ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15602025-03-01T00:11:59.820ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15612025-03-01T00:11:59.824ZDEBGtest_instance_serial (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15622025-03-01T00:11:59.824ZTRACtest_instance_serial (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
15632025-03-01T00:11:59.824ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15642025-03-01T00:11:59.824ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15652025-03-01T00:11:59.824ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15662025-03-01T00:11:59.824ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15672025-03-01T00:11:59.828ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15682025-03-01T00:11:59.831ZDEBGtest_instance_serial (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
15692025-03-01T00:11:59.859ZTRACtest_instance_serial (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15702025-03-01T00:11:59.859ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15712025-03-01T00:11:59.860ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15722025-03-01T00:11:59.861ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15732025-03-01T00:11:59.861ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15742025-03-01T00:11:59.862ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15752025-03-01T00:11:59.868ZDEBGtest_instance_serial (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15762025-03-01T00:11:59.868ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15772025-03-01T00:11:59.868ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15782025-03-01T00:11:59.868ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15792025-03-01T00:11:59.868ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15802025-03-01T00:11:59.869ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15812025-03-01T00:11:59.871ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15822025-03-01T00:11:59.877ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15832025-03-01T00:11:59.879ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig
15842025-03-01T00:11:59.879ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15852025-03-01T00:11:59.879ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15862025-03-01T00:11:59.879ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15872025-03-01T00:11:59.880ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15882025-03-01T00:11:59.881ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15892025-03-01T00:11:59.887ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = DnsConfig result = Ok(())
15902025-03-01T00:11:59.894ZINFOtest_instance_serial (InternalApi): Created recovery silo
15912025-03-01T00:11:59.895ZINFOtest_instance_serial (InternalApi): Created recovery user
15922025-03-01T00:11:59.931ZINFOtest_instance_serial (InternalApi): Created recovery user's password
15932025-03-01T00:11:59.932ZTRACtest_instance_serial (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, lookup_type: ById(dc7acbaa-3bf5-44f0-bd58-7164e43b87a2) }
15942025-03-01T00:11:59.932ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = dc7acbaa-3bf5-44f0-bd58-7164e43b87a2 resource_type = Silo
15952025-03-01T00:11:59.932ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
15962025-03-01T00:11:59.932ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
15972025-03-01T00:11:59.932ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
15982025-03-01T00:11:59.934ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15992025-03-01T00:11:59.934ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16002025-03-01T00:11:59.934ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16012025-03-01T00:11:59.934ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16022025-03-01T00:11:59.936ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16032025-03-01T00:11:59.939ZDEBGtest_instance_serial (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Silo { parent: Fleet, key: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, lookup_type: ById(dc7acbaa-3bf5-44f0-bd58-7164e43b87a2) } result = Ok(())
16042025-03-01T00:11:59.940ZDEBGtest_instance_serial (InternalApi): Generated role assignment queries
16052025-03-01T00:11:59.948ZINFOtest_instance_serial (InternalApi): Granted Silo privileges
16062025-03-01T00:11:59.949ZTRACtest_instance_serial (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
16072025-03-01T00:11:59.949ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16082025-03-01T00:11:59.949ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16092025-03-01T00:11:59.949ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16102025-03-01T00:11:59.950ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16112025-03-01T00:11:59.958ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16122025-03-01T00:11:59.961ZDEBGtest_instance_serial (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
16132025-03-01T00:11:59.981ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16142025-03-01T00:11:59.981ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16152025-03-01T00:11:59.981ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16162025-03-01T00:11:59.985ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16172025-03-01T00:11:59.985ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16182025-03-01T00:11:59.985ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16192025-03-01T00:11:59.986ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16202025-03-01T00:11:59.986ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16212025-03-01T00:11:59.987ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16222025-03-01T00:11:59.989ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16232025-03-01T00:11:59.989ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16242025-03-01T00:11:59.989ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16252025-03-01T00:11:59.989ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16262025-03-01T00:11:59.989ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16272025-03-01T00:11:59.991ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16282025-03-01T00:11:59.991ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16292025-03-01T00:11:59.991ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16302025-03-01T00:11:59.992ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16312025-03-01T00:11:59.995ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16322025-03-01T00:11:59.995ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16332025-03-01T00:11:59.995ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16342025-03-01T00:11:59.996ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16352025-03-01T00:11:59.998ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16362025-03-01T00:12:00.011ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16372025-03-01T00:12:00.011ZTRACtest_instance_serial (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
16382025-03-01T00:12:00.011ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16392025-03-01T00:12:00.011ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16402025-03-01T00:12:00.012ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16412025-03-01T00:12:00.013ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16422025-03-01T00:12:00.013ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16432025-03-01T00:12:00.014ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16442025-03-01T00:12:00.015ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16452025-03-01T00:12:00.015ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16462025-03-01T00:12:00.016ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16472025-03-01T00:12:00.017ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16482025-03-01T00:12:00.017ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16492025-03-01T00:12:00.017ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16502025-03-01T00:12:00.017ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16512025-03-01T00:12:00.019ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16522025-03-01T00:12:00.028ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16532025-03-01T00:12:00.028ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16542025-03-01T00:12:00.028ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16552025-03-01T00:12:00.028ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16562025-03-01T00:12:00.031ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16572025-03-01T00:12:00.031ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16582025-03-01T00:12:00.032ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16592025-03-01T00:12:00.033ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16602025-03-01T00:12:00.033ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16612025-03-01T00:12:00.034ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16622025-03-01T00:12:00.035ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16632025-03-01T00:12:00.035ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16642025-03-01T00:12:00.036ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16652025-03-01T00:12:00.037ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
16662025-03-01T00:12:00.037ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16672025-03-01T00:12:00.038ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16682025-03-01T00:12:00.038ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16692025-03-01T00:12:00.038ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16702025-03-01T00:12:00.051ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16712025-03-01T00:12:00.051ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16722025-03-01T00:12:00.051ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16732025-03-01T00:12:00.052ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16742025-03-01T00:12:00.054ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16752025-03-01T00:12:00.054ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16762025-03-01T00:12:00.055ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16772025-03-01T00:12:00.055ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16782025-03-01T00:12:00.056ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16792025-03-01T00:12:00.064ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
16802025-03-01T00:12:00.064ZTRACtest_instance_serial (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
16812025-03-01T00:12:00.064ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16822025-03-01T00:12:00.064ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16832025-03-01T00:12:00.065ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16842025-03-01T00:12:00.071ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16852025-03-01T00:12:00.071ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16862025-03-01T00:12:00.072ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16872025-03-01T00:12:00.073ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16882025-03-01T00:12:00.073ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16892025-03-01T00:12:00.074ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16902025-03-01T00:12:00.076ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16912025-03-01T00:12:00.076ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16922025-03-01T00:12:00.076ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16932025-03-01T00:12:00.078ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
16942025-03-01T00:12:00.079ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16952025-03-01T00:12:00.079ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
16962025-03-01T00:12:00.079ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
16972025-03-01T00:12:00.079ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
16982025-03-01T00:12:00.080ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16992025-03-01T00:12:00.081ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17002025-03-01T00:12:00.081ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17012025-03-01T00:12:00.081ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17022025-03-01T00:12:00.083ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17032025-03-01T00:12:00.084ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17042025-03-01T00:12:00.084ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17052025-03-01T00:12:00.084ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17062025-03-01T00:12:00.085ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17072025-03-01T00:12:00.093ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
17082025-03-01T00:12:00.093ZTRACtest_instance_serial (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
17092025-03-01T00:12:00.093ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
17102025-03-01T00:12:00.093ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17112025-03-01T00:12:00.093ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17122025-03-01T00:12:00.093ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17132025-03-01T00:12:00.094ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17142025-03-01T00:12:00.095ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17152025-03-01T00:12:00.096ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17162025-03-01T00:12:00.097ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17172025-03-01T00:12:00.097ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17182025-03-01T00:12:00.098ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17192025-03-01T00:12:00.099ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17202025-03-01T00:12:00.100ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17212025-03-01T00:12:00.100ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17222025-03-01T00:12:00.100ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17232025-03-01T00:12:00.108ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
17242025-03-01T00:12:00.109ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17252025-03-01T00:12:00.109ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17262025-03-01T00:12:00.109ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17272025-03-01T00:12:00.113ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17282025-03-01T00:12:00.113ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17292025-03-01T00:12:00.113ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17302025-03-01T00:12:00.116ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17312025-03-01T00:12:00.116ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17322025-03-01T00:12:00.117ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17332025-03-01T00:12:00.120ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17342025-03-01T00:12:00.120ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17352025-03-01T00:12:00.121ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17362025-03-01T00:12:00.123ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17372025-03-01T00:12:00.123ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17382025-03-01T00:12:00.123ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17392025-03-01T00:12:00.125ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17402025-03-01T00:12:00.126ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17412025-03-01T00:12:00.126ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17422025-03-01T00:12:00.126ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17432025-03-01T00:12:00.126ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17442025-03-01T00:12:00.127ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17452025-03-01T00:12:00.129ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17462025-03-01T00:12:00.129ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17472025-03-01T00:12:00.129ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17482025-03-01T00:12:00.130ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17492025-03-01T00:12:00.131ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17502025-03-01T00:12:00.131ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17512025-03-01T00:12:00.131ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17522025-03-01T00:12:00.132ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17532025-03-01T00:12:00.141ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17542025-03-01T00:12:00.141ZTRACtest_instance_serial (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
17552025-03-01T00:12:00.141ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17562025-03-01T00:12:00.141ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17572025-03-01T00:12:00.141ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17582025-03-01T00:12:00.141ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17592025-03-01T00:12:00.141ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17602025-03-01T00:12:00.143ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17612025-03-01T00:12:00.143ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17622025-03-01T00:12:00.143ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17632025-03-01T00:12:00.143ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17642025-03-01T00:12:00.145ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17652025-03-01T00:12:00.145ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17662025-03-01T00:12:00.145ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17672025-03-01T00:12:00.146ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17682025-03-01T00:12:00.148ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17692025-03-01T00:12:00.157ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17702025-03-01T00:12:00.157ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17712025-03-01T00:12:00.157ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17722025-03-01T00:12:00.157ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17732025-03-01T00:12:00.163ZDEBGtest_instance_serial (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 64a569ca-e7e0-49e6-9926-4760d48c2436, kind: Service { id: 4a162527-5074-4520-add9-9cf6820a1f4a }, name: Name("external-dns-4a162527-5074-4520-add9-9cf6820a1f4a"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("nexus"): [NetworkInterface { id: b387e5d1-22de-4cb7-8a4a-f1bf0701ede7, kind: Service { id: 07ece834-ed97-4e95-ace6-eee27c1e42f0 }, name: Name("nexus-07ece834-ed97-4e95-ace6-eee27c1e42f0"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
17742025-03-01T00:12:00.163ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
17752025-03-01T00:12:00.163ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17762025-03-01T00:12:00.164ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17772025-03-01T00:12:00.164ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17782025-03-01T00:12:00.164ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17792025-03-01T00:12:00.165ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17802025-03-01T00:12:00.169ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
17812025-03-01T00:12:00.169ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
17822025-03-01T00:12:00.169ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
17832025-03-01T00:12:00.169ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
17842025-03-01T00:12:00.171ZTRACtest_instance_serial (nexus): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-02-28T23:51:58.927566Z, time_modified: 2025-03-01T00:11:59.963399Z, allowed_ips: None }
17852025-03-01T00:12:00.171ZDEBGtest_instance_serial (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
17862025-03-01T00:12:00.171ZDEBGtest_instance_serial (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 64a569ca-e7e0-49e6-9926-4760d48c2436, kind: Service { id: 4a162527-5074-4520-add9-9cf6820a1f4a }, name: Name("external-dns-4a162527-5074-4520-add9-9cf6820a1f4a"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: b387e5d1-22de-4cb7-8a4a-f1bf0701ede7, kind: Service { id: 07ece834-ed97-4e95-ace6-eee27c1e42f0 }, name: Name("nexus-07ece834-ed97-4e95-ace6-eee27c1e42f0"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
17872025-03-01T00:12:00.171ZDEBGtest_instance_serial (nexus): resolved 2 rules for sleds
17882025-03-01T00:12:00.258ZDEBGtest_instance_serial (nexus): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2025-03-01T00:11:55.931359Z, time_modified: 2025-03-01T00:11:55.931359Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(38105), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(34345) }]
17892025-03-01T00:12:00.259ZDEBGtest_instance_serial (nexus): sending firewall rules to sled agents
17902025-03-01T00:12:00.259ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
17912025-03-01T00:12:00.259ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
17922025-03-01T00:12:00.259ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
17932025-03-01T00:12:00.262ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
17942025-03-01T00:12:00.262ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17952025-03-01T00:12:00.262ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
17962025-03-01T00:12:00.262ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
17972025-03-01T00:12:00.262ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
17982025-03-01T00:12:00.265ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
17992025-03-01T00:12:00.269ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
18002025-03-01T00:12:00.314ZDEBGtest_instance_serial (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:38105/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18012025-03-01T00:12:00.315ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50036 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
18022025-03-01T00:12:00.315ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50036 req_id = ed30668f-0ba6-43e6-b332-457cbdc6ee0e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18032025-03-01T00:12:00.316ZINFOtest_instance_serial (dropshot): request completed latency_us = 621 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50036 req_id = ed30668f-0ba6-43e6-b332-457cbdc6ee0e response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
18042025-03-01T00:12:00.317ZDEBGtest_instance_serial (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:38105/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "ed30668f-0ba6-43e6-b332-457cbdc6ee0e", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
18052025-03-01T00:12:00.317ZINFOtest_instance_serial (nexus): updated firewall rules on 1 sleds
18062025-03-01T00:12:00.318ZTRACtest_instance_serial (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
18072025-03-01T00:12:00.318ZDEBGtest_instance_serial (ServiceBalancer): roles roles = RoleSet { roles: {} }
18082025-03-01T00:12:00.318ZDEBGtest_instance_serial (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
18092025-03-01T00:12:00.319ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 2 reason = Signaled
18102025-03-01T00:12:00.319ZDEBGtest_instance_serial (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
18112025-03-01T00:12:00.319ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
18122025-03-01T00:12:00.319ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
18132025-03-01T00:12:00.319ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
18142025-03-01T00:12:00.320ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 2 reason = Signaled
18152025-03-01T00:12:00.320ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
18162025-03-01T00:12:00.320ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 2 reason = Signaled
18172025-03-01T00:12:00.320ZDEBGtest_instance_serial (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
18182025-03-01T00:12:00.320ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
18192025-03-01T00:12:00.320ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
18202025-03-01T00:12:00.321ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
18212025-03-01T00:12:00.321ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 2 reason = Signaled
18222025-03-01T00:12:00.321ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
18232025-03-01T00:12:00.321ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = external_endpoints iteration = 2 reason = Signaled
18242025-03-01T00:12:00.321ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
18252025-03-01T00:12:00.321ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18262025-03-01T00:12:00.321ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
18272025-03-01T00:12:00.322ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
18282025-03-01T00:12:00.322ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
18292025-03-01T00:12:00.322ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = inventory_collection iteration = 3 reason = Signaled
18302025-03-01T00:12:00.322ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
18312025-03-01T00:12:00.322ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18322025-03-01T00:12:00.322ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
18332025-03-01T00:12:00.323ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
18342025-03-01T00:12:00.323ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
18352025-03-01T00:12:00.323ZTRACtest_instance_serial (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: b8 61 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 .a..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:63186 req_id = 07ec3a48-dc48-482f-b1fe-9fadce79633f
18362025-03-01T00:12:00.323ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 47201,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:63186 req_id = 07ec3a48-dc48-482f-b1fe-9fadce79633f
18372025-03-01T00:12:00.323ZDEBGtest_instance_serial (store): query key key = _nameservice._tcp
18382025-03-01T00:12:00.323ZDEBGtest_instance_serial (store): query key key = 56963668-32be-40a0-9656-db179a86c4fe.host
18392025-03-01T00:12:00.323ZDEBGtest_instance_serial (dns): dns response additional_records = [Record { name_labels: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:63186 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42817, target: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal") })) }] req_id = 07ec3a48-dc48-482f-b1fe-9fadce79633f
18402025-03-01T00:12:00.323ZTRACtest_instance_serial (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 8b 26 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 .&..........._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:52789 req_id = c451ab88-5c31-45dd-b21b-5cf33233f17f
18412025-03-01T00:12:00.324ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 35622,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52789 req_id = c451ab88-5c31-45dd-b21b-5cf33233f17f
18422025-03-01T00:12:00.324ZDEBGtest_instance_serial (store): query key key = _external-dns._tcp
18432025-03-01T00:12:00.324ZDEBGtest_instance_serial (store): query key key = 4a162527-5074-4520-add9-9cf6820a1f4a.host
18442025-03-01T00:12:00.325ZDEBGtest_instance_serial (dns): dns response additional_records = [Record { name_labels: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:52789 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 44469, target: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal") })) }] req_id = c451ab88-5c31-45dd-b21b-5cf33233f17f
18452025-03-01T00:12:00.325ZDEBGtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 42817, target: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 1990, tv_nsec: 91684493 } })
18462025-03-01T00:12:00.325ZTRACtest_instance_serial (DnsResolver): lookup_service_targets: looking up SRV target
18472025-03-01T00:12:00.325ZDEBGtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 44469, target: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 1990, tv_nsec: 92605317 } })
18482025-03-01T00:12:00.325ZTRACtest_instance_serial (DnsResolver): lookup_service_targets: looking up SRV target
18492025-03-01T00:12:00.325ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
18502025-03-01T00:12:00.325ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18512025-03-01T00:12:00.325ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
18522025-03-01T00:12:00.325ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
18532025-03-01T00:12:00.326ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
18542025-03-01T00:12:00.326ZTRACtest_instance_serial (ServiceBalancer): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
18552025-03-01T00:12:00.326ZTRACtest_instance_serial (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18562025-03-01T00:12:00.326ZTRACtest_instance_serial (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database
18572025-03-01T00:12:00.326ZDEBGtest_instance_serial (ServiceBalancer): roles roles = RoleSet { roles: {} }
18582025-03-01T00:12:00.327ZDEBGtest_instance_serial (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Database result = Ok(())
18592025-03-01T00:12:00.327ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
18602025-03-01T00:12:00.328ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18612025-03-01T00:12:00.328ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
18622025-03-01T00:12:00.328ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
18632025-03-01T00:12:00.328ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
18642025-03-01T00:12:00.328ZTRACtest_instance_serial (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 03 a9 01 00 00 01 00 00 00 00 00 01 24 35 36 39 ............$569\n0010: 36 33 36 36 38 2d 33 32 62 65 2d 34 30 61 30 2d 63668-32be-40a0-\n0020: 39 36 35 36 2d 64 62 31 37 39 61 38 36 63 34 66 9656-db179a86c4f\n0030: 65 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 e.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:64612 req_id = ae9f0992-7977-4c0b-8ebb-f6dcbff8e4d3
18652025-03-01T00:12:00.328ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 937,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 53,\n 54,\n 57,\n 54,\n 51,\n 54,\n 54,\n 56,\n 45,\n 51,\n 50,\n 98,\n 101,\n 45,\n 52,\n 48,\n 97,\n 48,\n 45,\n 57,\n 54,\n 53,\n 54,\n 45,\n 100,\n 98,\n 49,\n 55,\n 57,\n 97,\n 56,\n 54,\n 99,\n 52,\n 102,\n 101,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:64612 req_id = ae9f0992-7977-4c0b-8ebb-f6dcbff8e4d3
18662025-03-01T00:12:00.329ZDEBGtest_instance_serial (store): query key key = 56963668-32be-40a0-9656-db179a86c4fe.host
18672025-03-01T00:12:00.329ZDEBGtest_instance_serial (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:64612 query = LowerQuery { name: LowerName(Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal.")), original: Query { name: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("56963668-32be-40a0-9656-db179a86c4fe.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = ae9f0992-7977-4c0b-8ebb-f6dcbff8e4d3
18682025-03-01T00:12:00.329ZTRACtest_instance_serial (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 9c e6 01 00 00 01 00 00 00 00 00 01 24 34 61 31 ............$4a1\n0010: 36 32 35 32 37 2d 35 30 37 34 2d 34 35 32 30 2d 62527-5074-4520-\n0020: 61 64 64 39 2d 39 63 66 36 38 32 30 61 31 66 34 add9-9cf6820a1f4\n0030: 61 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 a.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:62200 req_id = 5bf67cb6-5b18-446c-871a-c894a8ad5fab
18692025-03-01T00:12:00.329ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 40166,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 52,\n 97,\n 49,\n 54,\n 50,\n 53,\n 50,\n 55,\n 45,\n 53,\n 48,\n 55,\n 52,\n 45,\n 52,\n 53,\n 50,\n 48,\n 45,\n 97,\n 100,\n 100,\n 57,\n 45,\n 57,\n 99,\n 102,\n 54,\n 56,\n 50,\n 48,\n 97,\n 49,\n 102,\n 52,\n 97,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:62200 req_id = 5bf67cb6-5b18-446c-871a-c894a8ad5fab
18702025-03-01T00:12:00.329ZDEBGtest_instance_serial (store): query key key = 4a162527-5074-4520-add9-9cf6820a1f4a.host
18712025-03-01T00:12:00.330ZDEBGtest_instance_serial (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:62200 query = LowerQuery { name: LowerName(Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal.")), original: Query { name: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("4a162527-5074-4520-add9-9cf6820a1f4a.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 5bf67cb6-5b18-446c-871a-c894a8ad5fab
18722025-03-01T00:12:00.330ZINFOtest_instance_serial (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:42817] } background_task = dns_servers_internal dns_group = internal
18732025-03-01T00:12:00.330ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 10.903585ms iteration = 2 status = {"addresses":["[::1]:42817"]}
18742025-03-01T00:12:00.330ZINFOtest_instance_serial (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:44469] } background_task = dns_servers_external dns_group = external
18752025-03-01T00:12:00.330ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 10.414002ms iteration = 2 status = {"addresses":["[::1]:44469"]}
18762025-03-01T00:12:00.332ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 2 reason = Dependency
18772025-03-01T00:12:00.332ZWARNtest_instance_serial (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config
18782025-03-01T00:12:00.332ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 33.292\u{b5}s iteration = 2 status = {"error":"no config"}
18792025-03-01T00:12:00.332ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 2 reason = Dependency
18802025-03-01T00:12:00.332ZWARNtest_instance_serial (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config
18812025-03-01T00:12:00.332ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 15.891\u{b5}s iteration = 2 status = {"error":"no config"}
18822025-03-01T00:12:00.332ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18832025-03-01T00:12:00.335ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
18842025-03-01T00:12:00.336ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
18852025-03-01T00:12:00.336ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
18862025-03-01T00:12:00.336ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
18872025-03-01T00:12:00.336ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18882025-03-01T00:12:00.340ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
18892025-03-01T00:12:00.340ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
18902025-03-01T00:12:00.340ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
18912025-03-01T00:12:00.341ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
18922025-03-01T00:12:00.342ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18932025-03-01T00:12:00.347ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
18942025-03-01T00:12:00.348ZDEBGtest_instance_serial (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
18952025-03-01T00:12:00.349ZDEBGtest_instance_serial (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
18962025-03-01T00:12:00.349ZDEBGtest_instance_serial (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
18972025-03-01T00:12:00.349ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
18982025-03-01T00:12:00.349ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18992025-03-01T00:12:00.349ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19002025-03-01T00:12:00.349ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19012025-03-01T00:12:00.349ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19022025-03-01T00:12:00.350ZDEBGtest_instance_serial (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19032025-03-01T00:12:00.356ZDEBGtest_instance_serial (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3, .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
19042025-03-01T00:12:00.356ZINFOtest_instance_serial (nexus): Rack initialized
19052025-03-01T00:12:00.356ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19062025-03-01T00:12:00.357ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
19072025-03-01T00:12:00.357ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19082025-03-01T00:12:00.359ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig
19092025-03-01T00:12:00.359ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19102025-03-01T00:12:00.359ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19112025-03-01T00:12:00.359ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19122025-03-01T00:12:00.360ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19132025-03-01T00:12:00.361ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19142025-03-01T00:12:00.366ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
19152025-03-01T00:12:00.367ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19162025-03-01T00:12:00.367ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19172025-03-01T00:12:00.367ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19182025-03-01T00:12:00.375ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19192025-03-01T00:12:00.375ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
19202025-03-01T00:12:00.376ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19212025-03-01T00:12:00.381ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19222025-03-01T00:12:00.381ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
19232025-03-01T00:12:00.382ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19242025-03-01T00:12:00.386ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
19252025-03-01T00:12:00.386ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
19262025-03-01T00:12:00.387ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19272025-03-01T00:12:00.387ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
19282025-03-01T00:12:00.387ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19292025-03-01T00:12:00.387ZDEBGtest_instance_serial (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(5702d944-2c62-46b6-8f7d-27d83b7977da, 0)]
19302025-03-01T00:12:00.389ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
19312025-03-01T00:12:00.390ZTRACtest_instance_serial (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 5b 09 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 [............_mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:53256 req_id = afa75596-05a8-4b7c-95c8-e15a356d63ec
19322025-03-01T00:12:00.390ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 23305,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:53256 req_id = afa75596-05a8-4b7c-95c8-e15a356d63ec
19332025-03-01T00:12:00.391ZDEBGtest_instance_serial (store): query key key = _mgs._tcp
19342025-03-01T00:12:00.391ZDEBGtest_instance_serial (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
19352025-03-01T00:12:00.391ZDEBGtest_instance_serial (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:53256 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39563, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") })) }] req_id = afa75596-05a8-4b7c-95c8-e15a356d63ec
19362025-03-01T00:12:00.391ZDEBGtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal"), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 39563, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") })) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }], valid_until: Instant { tv_sec: 1990, tv_nsec: 158654163 } })
19372025-03-01T00:12:00.391ZTRACtest_instance_serial (DnsResolver): lookup_service_targets: looking up SRV target
19382025-03-01T00:12:00.392ZTRACtest_instance_serial (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: ff d5 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:55725 req_id = b11c47e1-a8f3-4cbe-abc2-0b656f86af98
19392025-03-01T00:12:00.392ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 65493,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:55725 req_id = b11c47e1-a8f3-4cbe-abc2-0b656f86af98
19402025-03-01T00:12:00.392ZDEBGtest_instance_serial (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
19412025-03-01T00:12:00.394ZDEBGtest_instance_serial (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:55725 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = b11c47e1-a8f3-4cbe-abc2-0b656f86af98
19422025-03-01T00:12:00.394ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
19432025-03-01T00:12:00.394ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19442025-03-01T00:12:00.394ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
19452025-03-01T00:12:00.394ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19462025-03-01T00:12:00.430ZTRACtest_instance_serial (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
19472025-03-01T00:12:00.431ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19482025-03-01T00:12:00.437ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
19492025-03-01T00:12:00.437ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19502025-03-01T00:12:00.443ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
19512025-03-01T00:12:00.444ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
19522025-03-01T00:12:00.444ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
19532025-03-01T00:12:00.444ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
19542025-03-01T00:12:00.445ZDEBGtest_instance_serial (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
19552025-03-01T00:12:00.445ZDEBGtest_instance_serial (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = 5fff1c86-0b4b-47d2-9409-c52adf9914cd dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
19562025-03-01T00:12:00.445ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
19572025-03-01T00:12:00.445ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19582025-03-01T00:12:00.445ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19592025-03-01T00:12:00.445ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19602025-03-01T00:12:00.450ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19612025-03-01T00:12:00.451ZTRACtest_instance_serial (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 42 8f 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c B............_cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:60502 req_id = 12b045ef-eb24-4466-bc45-cde674644162
19622025-03-01T00:12:00.451ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 17039,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:60502 req_id = 12b045ef-eb24-4466-bc45-cde674644162
19632025-03-01T00:12:00.451ZDEBGtest_instance_serial (store): query key key = _clickhouse-admin-keeper._tcp
19642025-03-01T00:12:00.451ZERROtest_instance_serial (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 17039, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, query: WireQuery { query: LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, dnssec_ok: false, max_payload: 1232, options: OPT { options: {}, }, }, ), } NXDOMAIN: no records found for name: "_clickhouse-admin-keeper._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:60502 req_id = 12b045ef-eb24-4466-bc45-cde674644162
19652025-03-01T00:12:00.451ZDEBGtest_instance_serial (BackgroundTasks): begin collection background_task = inventory_collection
19662025-03-01T00:12:00.451ZDEBGtest_instance_serial (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:39563
19672025-03-01T00:12:00.451ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/ignition
19682025-03-01T00:12:00.451ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19692025-03-01T00:12:00.451ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19702025-03-01T00:12:00.451ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
19712025-03-01T00:12:00.451ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19722025-03-01T00:12:00.451ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19732025-03-01T00:12:00.456ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
19742025-03-01T00:12:00.456ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database
19752025-03-01T00:12:00.456ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
19762025-03-01T00:12:00.456ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
19772025-03-01T00:12:00.458ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "69aeb42c-0e1b-433d-bc6f-ff8397989312", "content-length": "835", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
19782025-03-01T00:12:00.458ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0
19792025-03-01T00:12:00.459ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19802025-03-01T00:12:00.467ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
19812025-03-01T00:12:00.467ZTRACtest_instance_serial (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
19822025-03-01T00:12:00.468ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
19832025-03-01T00:12:00.468ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
19842025-03-01T00:12:00.468ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
19852025-03-01T00:12:00.468ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
19862025-03-01T00:12:00.468ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
19872025-03-01T00:12:00.468ZDEBGtest_instance_serial (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = 5fff1c86-0b4b-47d2-9409-c52adf9914cd dns_zone_name = control-plane.oxide.internal found_so_far = 17 version = 1
19882025-03-01T00:12:00.468ZDEBGtest_instance_serial (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
19892025-03-01T00:12:00.468ZINFOtest_instance_serial (BackgroundTasks): found latest generation (first find) background_task = dns_config_internal dns_group = internal generation = 1
19902025-03-01T00:12:00.468ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 149.035443ms iteration = 2 status = {"generation":1}
19912025-03-01T00:12:00.468ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 3 reason = Dependency
19922025-03-01T00:12:00.503ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:42817 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:42817] } uri = http://[::1]:42817/config
19932025-03-01T00:12:00.504ZDEBGtest_instance_serial (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 2
19942025-03-01T00:12:00.504ZDEBGtest_instance_serial (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
19952025-03-01T00:12:00.504ZDEBGtest_instance_serial (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
19962025-03-01T00:12:00.504ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
19972025-03-01T00:12:00.504ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19982025-03-01T00:12:00.504ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
19992025-03-01T00:12:00.504ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20002025-03-01T00:12:00.504ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20012025-03-01T00:12:00.505ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet
20022025-03-01T00:12:00.505ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20032025-03-01T00:12:00.506ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20042025-03-01T00:12:00.506ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20052025-03-01T00:12:00.506ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20062025-03-01T00:12:00.506ZINFOtest_instance_serial (http): accepted connection kind = dns local_addr = [::1]:42817 remote_addr = [::1]:42950
20072025-03-01T00:12:00.506ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20082025-03-01T00:12:00.506ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20092025-03-01T00:12:00.506ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
20102025-03-01T00:12:00.507ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20112025-03-01T00:12:00.508ZTRACtest_instance_serial (http): incoming request kind = dns local_addr = [::1]:42817 method = PUT remote_addr = [::1]:42950 req_id = 38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9 uri = /config
20122025-03-01T00:12:00.508ZINFOtest_instance_serial (store): attempting generation update new_generation = 1 req_id = 38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9
20132025-03-01T00:12:00.508ZINFOtest_instance_serial (store): updated generation new_generation = 1 req_id = 38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9
20142025-03-01T00:12:00.508ZINFOtest_instance_serial (http): request completed kind = dns latency_us = 767 local_addr = [::1]:42817 method = PUT remote_addr = [::1]:42950 req_id = 38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9 response_code = 204 uri = /config
20152025-03-01T00:12:00.508ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20162025-03-01T00:12:00.513ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
20172025-03-01T00:12:00.514ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20182025-03-01T00:12:00.514ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20192025-03-01T00:12:00.514ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20202025-03-01T00:12:00.515ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20212025-03-01T00:12:00.518ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Fleet result = Ok(())
20222025-03-01T00:12:00.519ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database
20232025-03-01T00:12:00.519ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
20242025-03-01T00:12:00.519ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = external_endpoints resource = Database result = Ok(())
20252025-03-01T00:12:00.520ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:42817 generation = 1 result = Ok(Response { url: "http://[::1]:42817/config", status: 204, headers: {"x-request-id": "38cb0685-c3bf-4f07-8af1-ead7c4ba7bf9", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} }) servers = DnsServersList { addresses: [[::1]:42817] }
20262025-03-01T00:12:00.520ZINFOtest_instance_serial (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:42817 generation = 1 servers = DnsServersList { addresses: [[::1]:42817] }
20272025-03-01T00:12:00.521ZINFOtest_instance_serial (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:42817] }
20282025-03-01T00:12:00.521ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 53.360075ms iteration = 3 status = {"generation":1,"server_results":{"[::1]:42817":{"Ok":null}}}
20292025-03-01T00:12:00.522ZDEBGtest_instance_serial (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
20302025-03-01T00:12:00.522ZDEBGtest_instance_serial (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 07110f70-f19c-4c8e-ac7d-5b3429a936ec dns_zone_name = oxide-dev.test found_so_far = 0 version = 2
20312025-03-01T00:12:00.522ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
20322025-03-01T00:12:00.523ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20332025-03-01T00:12:00.523ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20342025-03-01T00:12:00.523ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20352025-03-01T00:12:00.523ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20362025-03-01T00:12:00.523ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20372025-03-01T00:12:00.523ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20382025-03-01T00:12:00.523ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
20392025-03-01T00:12:00.524ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20402025-03-01T00:12:00.524ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6529069f-c39e-4885-8412-8ae7206e6f79", "content-length": "734", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
20412025-03-01T00:12:00.525ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=0
20422025-03-01T00:12:00.525ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20432025-03-01T00:12:00.532ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
20442025-03-01T00:12:00.532ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database
20452025-03-01T00:12:00.532ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
20462025-03-01T00:12:00.532ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
20472025-03-01T00:12:00.533ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20482025-03-01T00:12:00.540ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
20492025-03-01T00:12:00.541ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20502025-03-01T00:12:00.541ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
20512025-03-01T00:12:00.541ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20522025-03-01T00:12:00.544ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6793ca5b-65a6-4f6f-a888-d63b55f78834", "content-length": "111", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
20532025-03-01T00:12:00.544ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=1
20542025-03-01T00:12:00.544ZDEBGtest_instance_serial (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 07110f70-f19c-4c8e-ac7d-5b3429a936ec dns_zone_name = oxide-dev.test found_so_far = 1 version = 2
20552025-03-01T00:12:00.544ZDEBGtest_instance_serial (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 2
20562025-03-01T00:12:00.544ZINFOtest_instance_serial (BackgroundTasks): found latest generation (first find) background_task = dns_config_external dns_group = external generation = 2
20572025-03-01T00:12:00.544ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 224.343292ms iteration = 2 status = {"generation":2}
20582025-03-01T00:12:00.544ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 3 reason = Dependency
20592025-03-01T00:12:00.578ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:44469 generation = 2 method = PUT servers = DnsServersList { addresses: [[::1]:44469] } uri = http://[::1]:44469/config
20602025-03-01T00:12:00.579ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20612025-03-01T00:12:00.579ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
20622025-03-01T00:12:00.579ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20632025-03-01T00:12:00.579ZINFOtest_instance_serial (http): accepted connection kind = dns local_addr = [::1]:44469 remote_addr = [::1]:48014
20642025-03-01T00:12:00.580ZTRACtest_instance_serial (http): incoming request kind = dns local_addr = [::1]:44469 method = PUT remote_addr = [::1]:48014 req_id = 89f230c6-1fa9-4b44-8951-4f0304f3e1e9 uri = /config
20652025-03-01T00:12:00.581ZINFOtest_instance_serial (store): attempting generation update new_generation = 2 req_id = 89f230c6-1fa9-4b44-8951-4f0304f3e1e9
20662025-03-01T00:12:00.581ZINFOtest_instance_serial (store): pruning trees for generations newer than 0
20672025-03-01T00:12:00.581ZDEBGtest_instance_serial (store): creating tree tree_name = generation_2_zone_oxide-dev.test
20682025-03-01T00:12:00.582ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20692025-03-01T00:12:00.583ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
20702025-03-01T00:12:00.583ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20712025-03-01T00:12:00.584ZDEBGtest_instance_serial (store): updating current config
20722025-03-01T00:12:00.584ZDEBGtest_instance_serial (store): flushing default tree
20732025-03-01T00:12:00.585ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "4e8eb7de-7bc8-420e-b305-8036ad331e2b", "content-length": "111", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
20742025-03-01T00:12:00.585ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=0
20752025-03-01T00:12:00.585ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20762025-03-01T00:12:00.585ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
20772025-03-01T00:12:00.586ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20782025-03-01T00:12:00.586ZINFOtest_instance_serial (store): pruning trees for generations older than 2 keep = 3
20792025-03-01T00:12:00.586ZINFOtest_instance_serial (store): updated generation new_generation = 2 req_id = 89f230c6-1fa9-4b44-8951-4f0304f3e1e9
20802025-03-01T00:12:00.586ZINFOtest_instance_serial (http): request completed kind = dns latency_us = 6061 local_addr = [::1]:44469 method = PUT remote_addr = [::1]:48014 req_id = 89f230c6-1fa9-4b44-8951-4f0304f3e1e9 response_code = 204 uri = /config
20812025-03-01T00:12:00.587ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:44469 generation = 2 result = Ok(Response { url: "http://[::1]:44469/config", status: 204, headers: {"x-request-id": "89f230c6-1fa9-4b44-8951-4f0304f3e1e9", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} }) servers = DnsServersList { addresses: [[::1]:44469] }
20822025-03-01T00:12:00.588ZINFOtest_instance_serial (BackgroundTasks): DNS server now at generation 2 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:44469 generation = 2 servers = DnsServersList { addresses: [[::1]:44469] }
20832025-03-01T00:12:00.588ZINFOtest_instance_serial (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 2 servers = DnsServersList { addresses: [[::1]:44469] }
20842025-03-01T00:12:00.588ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 44.344658ms iteration = 3 status = {"generation":2,"server_results":{"[::1]:44469":{"Ok":null}}}
20852025-03-01T00:12:00.589ZINFOtest_instance_serial (BackgroundTasks): found Silo/DNS/TLS config (initial) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2025-03-01T00:11:53.899134Z, time_modified: 2025-03-01T00:11:53.899134Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)) }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, db_silo: Silo { identity: SiloIdentity { id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-01T00:11:59.817794Z, time_modified: 2025-03-01T00:11:59.817794Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, db_silo: Silo { identity: SiloIdentity { id: dc7acbaa-3bf5-44f0-bd58-7164e43b87a2, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2025-03-01T00:11:59.817794Z, time_modified: 2025-03-01T00:11:59.817794Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)) }, tls_certs: [] }) }
20862025-03-01T00:12:00.590ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 269.309136ms iteration = 2 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"dc7acbaa-3bf5-44f0-bd58-7164e43b87a2","tls_certs":[]}},"default_endpoint":{"silo_id":"dc7acbaa-3bf5-44f0-bd58-7164e43b87a2","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo dc7acbaa-3bf5-44f0-bd58-7164e43b87a2 with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
20872025-03-01T00:12:00.590ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
20882025-03-01T00:12:00.591ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
20892025-03-01T00:12:00.591ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20902025-03-01T00:12:00.591ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
20912025-03-01T00:12:00.591ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20922025-03-01T00:12:00.592ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "337dd776-b571-42c4-b219-fb45144526c0", "content-length": "167", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
20932025-03-01T00:12:00.592ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=1
20942025-03-01T00:12:00.593ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20952025-03-01T00:12:00.593ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
20962025-03-01T00:12:00.594ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
20972025-03-01T00:12:00.594ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
20982025-03-01T00:12:00.595ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20992025-03-01T00:12:00.596ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21002025-03-01T00:12:00.596ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21012025-03-01T00:12:00.596ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21022025-03-01T00:12:00.596ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7ec494ed-0deb-4d30-a0cd-f5a35d1fbd07", "content-length": "167", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21032025-03-01T00:12:00.596ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=0
21042025-03-01T00:12:00.598ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21052025-03-01T00:12:00.605ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
21062025-03-01T00:12:00.605ZTRACtest_instance_serial (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
21072025-03-01T00:12:00.605ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21082025-03-01T00:12:00.605ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21092025-03-01T00:12:00.606ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21102025-03-01T00:12:00.606ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3e02dd72-aa98-4226-923f-e0e3d4243a4d", "content-length": "175", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21112025-03-01T00:12:00.607ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=1
21122025-03-01T00:12:00.608ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21132025-03-01T00:12:00.608ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21142025-03-01T00:12:00.608ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21152025-03-01T00:12:00.609ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e8932177-2fc2-4f9f-95d7-2f8bd8e64861", "content-length": "175", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21162025-03-01T00:12:00.610ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/cmpa
21172025-03-01T00:12:00.610ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21182025-03-01T00:12:00.610ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21192025-03-01T00:12:00.610ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21202025-03-01T00:12:00.611ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "64897169-c537-4b73-8d74-17ad3193303c", "content-length": "702", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21212025-03-01T00:12:00.612ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
21222025-03-01T00:12:00.612ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21232025-03-01T00:12:00.612ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21242025-03-01T00:12:00.613ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21252025-03-01T00:12:00.613ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "811ea6aa-ca45-4245-8d33-b0f1bf4ba25a", "content-length": "727", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21262025-03-01T00:12:00.613ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
21272025-03-01T00:12:00.614ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "af08f718-17c4-4417-84d1-1128884bc60b", "content-length": "729", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21282025-03-01T00:12:00.615ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/0/component/rot/cfpa
21292025-03-01T00:12:00.615ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "e4cf479e-20bb-454c-9318-974a1524491c", "content-length": "728", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21302025-03-01T00:12:00.616ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1
21312025-03-01T00:12:00.616ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
21322025-03-01T00:12:00.616ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21332025-03-01T00:12:00.616ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21342025-03-01T00:12:00.616ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21352025-03-01T00:12:00.617ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21362025-03-01T00:12:00.617ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cff79d47-5527-42fb-89bb-170fbb293a84", "content-length": "734", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21372025-03-01T00:12:00.618ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=0
21382025-03-01T00:12:00.619ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21392025-03-01T00:12:00.620ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21402025-03-01T00:12:00.620ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21412025-03-01T00:12:00.620ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21422025-03-01T00:12:00.620ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "db57b303-f85e-4a2a-a9cb-b4ac7dd2a8cd", "content-length": "111", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21432025-03-01T00:12:00.620ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=1
21442025-03-01T00:12:00.621ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21452025-03-01T00:12:00.622ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21462025-03-01T00:12:00.622ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21472025-03-01T00:12:00.622ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21482025-03-01T00:12:00.623ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21492025-03-01T00:12:00.630ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
21502025-03-01T00:12:00.630ZTRACtest_instance_serial (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
21512025-03-01T00:12:00.630ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
21522025-03-01T00:12:00.630ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21532025-03-01T00:12:00.630ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21542025-03-01T00:12:00.630ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21552025-03-01T00:12:00.630ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21562025-03-01T00:12:00.631ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c5c6639a-34f7-4c00-b5b6-13380e40fe23", "content-length": "111", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21572025-03-01T00:12:00.632ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=0
21582025-03-01T00:12:00.632ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21592025-03-01T00:12:00.632ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21602025-03-01T00:12:00.632ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21612025-03-01T00:12:00.633ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21622025-03-01T00:12:00.634ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "74746d9a-5ade-4e0e-a164-a16653cc44d3", "content-length": "167", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21632025-03-01T00:12:00.634ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=1
21642025-03-01T00:12:00.634ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21652025-03-01T00:12:00.636ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21662025-03-01T00:12:00.636ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21672025-03-01T00:12:00.636ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21682025-03-01T00:12:00.637ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21692025-03-01T00:12:00.644ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
21702025-03-01T00:12:00.644ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21712025-03-01T00:12:00.644ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21722025-03-01T00:12:00.645ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21732025-03-01T00:12:00.645ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ff994c5d-2c3e-4376-b5e2-f46fc28c2aa6", "content-length": "167", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21742025-03-01T00:12:00.645ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=0
21752025-03-01T00:12:00.647ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "c3525bdd-cad2-49e1-b2ba-fac7349e7ef3", "content-length": "175", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21762025-03-01T00:12:00.648ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=1
21772025-03-01T00:12:00.649ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21782025-03-01T00:12:00.650ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21792025-03-01T00:12:00.650ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21802025-03-01T00:12:00.651ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "d507951a-754f-4747-bffc-ccce620cc5d0", "content-length": "175", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21812025-03-01T00:12:00.652ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/cmpa
21822025-03-01T00:12:00.652ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21832025-03-01T00:12:00.652ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21842025-03-01T00:12:00.652ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21852025-03-01T00:12:00.656ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b03d1ee-eaa7-423b-a256-58945f431419", "content-length": "702", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21862025-03-01T00:12:00.656ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
21872025-03-01T00:12:00.656ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21882025-03-01T00:12:00.656ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21892025-03-01T00:12:00.657ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21902025-03-01T00:12:00.658ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f8b5029c-ea5a-4cbb-a202-69f9ca215233", "content-length": "727", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21912025-03-01T00:12:00.658ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
21922025-03-01T00:12:00.658ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "268325dc-3bde-4193-9eef-06fc9558aa77", "content-length": "729", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21932025-03-01T00:12:00.658ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/switch/1/component/rot/cfpa
21942025-03-01T00:12:00.658ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
21952025-03-01T00:12:00.658ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
21962025-03-01T00:12:00.658ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
21972025-03-01T00:12:00.658ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "45b636fa-4d89-4322-a195-53ffef10763e", "content-length": "728", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
21982025-03-01T00:12:00.658ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0
21992025-03-01T00:12:00.658ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
22002025-03-01T00:12:00.658ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22012025-03-01T00:12:00.659ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22022025-03-01T00:12:00.660ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22032025-03-01T00:12:00.660ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22042025-03-01T00:12:00.660ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8fd0b863-b1ef-43fd-8c85-0f50f43de181", "content-length": "723", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22052025-03-01T00:12:00.660ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=0
22062025-03-01T00:12:00.661ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22072025-03-01T00:12:00.662ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22082025-03-01T00:12:00.662ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22092025-03-01T00:12:00.662ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22102025-03-01T00:12:00.663ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "118d8698-183d-4561-b059-1255c92b292c", "content-length": "109", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22112025-03-01T00:12:00.664ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=1
22122025-03-01T00:12:00.664ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22132025-03-01T00:12:00.664ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22142025-03-01T00:12:00.664ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22152025-03-01T00:12:00.664ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22162025-03-01T00:12:00.665ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22172025-03-01T00:12:00.672ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
22182025-03-01T00:12:00.672ZTRACtest_instance_serial (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
22192025-03-01T00:12:00.672ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
22202025-03-01T00:12:00.672ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
22212025-03-01T00:12:00.672ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22222025-03-01T00:12:00.672ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22232025-03-01T00:12:00.673ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22242025-03-01T00:12:00.673ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b7ed24b7-10b3-4cca-9bab-68d09bd8e918", "content-length": "109", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22252025-03-01T00:12:00.674ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=0
22262025-03-01T00:12:00.675ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22272025-03-01T00:12:00.676ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22282025-03-01T00:12:00.676ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22292025-03-01T00:12:00.676ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22302025-03-01T00:12:00.677ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8b5e4b53-f68b-47e1-8c9a-ce32e2b1cbd8", "content-length": "169", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22312025-03-01T00:12:00.677ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=1
22322025-03-01T00:12:00.678ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22332025-03-01T00:12:00.678ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22342025-03-01T00:12:00.678ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22352025-03-01T00:12:00.678ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22362025-03-01T00:12:00.680ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22372025-03-01T00:12:00.687ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
22382025-03-01T00:12:00.688ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22392025-03-01T00:12:00.689ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22402025-03-01T00:12:00.689ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22412025-03-01T00:12:00.689ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "8ebb1562-d4d1-4295-8bc9-fdb9170a23e9", "content-length": "169", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22422025-03-01T00:12:00.689ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=0
22432025-03-01T00:12:00.691ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9015f790-1a3b-47ec-b8d2-fb33af648834", "content-length": "178", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22442025-03-01T00:12:00.691ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=1
22452025-03-01T00:12:00.693ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "40a073c0-8181-41cb-bcf7-894d34fe35dc", "content-length": "178", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22462025-03-01T00:12:00.693ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/cmpa
22472025-03-01T00:12:00.694ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "3997aa01-8161-4a7b-9b0d-932654eec1a6", "content-length": "702", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22482025-03-01T00:12:00.694ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
22492025-03-01T00:12:00.694ZDEBGtest_instance_serial (InternalApi): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("nexus"): [NetworkInterface { id: b387e5d1-22de-4cb7-8a4a-f1bf0701ede7, kind: Service { id: 07ece834-ed97-4e95-ace6-eee27c1e42f0 }, name: Name("nexus-07ece834-ed97-4e95-ace6-eee27c1e42f0"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }], Name("external-dns"): [NetworkInterface { id: 64a569ca-e7e0-49e6-9926-4760d48c2436, kind: Service { id: 4a162527-5074-4520-add9-9cf6820a1f4a }, name: Name("external-dns-4a162527-5074-4520-add9-9cf6820a1f4a"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }]} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
22502025-03-01T00:12:00.695ZTRACtest_instance_serial (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet
22512025-03-01T00:12:00.695ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22522025-03-01T00:12:00.695ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22532025-03-01T00:12:00.695ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22542025-03-01T00:12:00.695ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22552025-03-01T00:12:00.696ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b3f00786-fa68-4f56-a857-2866fddcc592", "content-length": "727", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22562025-03-01T00:12:00.697ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
22572025-03-01T00:12:00.697ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4d42e17e-4196-4945-8b2d-f8317be3938a", "content-length": "729", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22582025-03-01T00:12:00.697ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/0/component/rot/cfpa
22592025-03-01T00:12:00.699ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22602025-03-01T00:12:00.701ZDEBGtest_instance_serial (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Fleet result = Ok(())
22612025-03-01T00:12:00.701ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22622025-03-01T00:12:00.701ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22632025-03-01T00:12:00.702ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22642025-03-01T00:12:00.703ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1569b6ae-e9ab-46cf-8291-3aca0edaeb91", "content-length": "728", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22652025-03-01T00:12:00.703ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1
22662025-03-01T00:12:00.704ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b786d4f4-33c4-4d4f-9507-79939d34430e", "content-length": "723", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22672025-03-01T00:12:00.704ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=0
22682025-03-01T00:12:00.704ZTRACtest_instance_serial (InternalApi): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2025-02-28T23:51:58.927566Z, time_modified: 2025-03-01T00:11:59.963399Z, allowed_ips: None }
22692025-03-01T00:12:00.704ZDEBGtest_instance_serial (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
22702025-03-01T00:12:00.705ZDEBGtest_instance_serial (InternalApi): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("53")]), filter_protocols: Some([Udp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 64a569ca-e7e0-49e6-9926-4760d48c2436, kind: Service { id: 4a162527-5074-4520-add9-9cf6820a1f4a }, name: Name("external-dns-4a162527-5074-4520-add9-9cf6820a1f4a"), ip: 172.30.1.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), subnet: V4(Ipv4Net { addr: 172.30.1.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("80"), L4PortRange("443")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: b387e5d1-22de-4cb7-8a4a-f1bf0701ede7, kind: Service { id: 07ece834-ed97-4e95-ace6-eee27c1e42f0 }, name: Name("nexus-07ece834-ed97-4e95-ace6-eee27c1e42f0"), ip: 172.30.2.6, mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), subnet: V4(Ipv4Net { addr: 172.30.2.0, width: 24 }), vni: Vni(100), primary: true, slot: 0, transit_ips: [] }] }]
22712025-03-01T00:12:00.706ZDEBGtest_instance_serial (InternalApi): resolved 2 rules for sleds
22722025-03-01T00:12:00.707ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "b59499f5-d923-467b-b01d-3e651d9dccca", "content-length": "109", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22732025-03-01T00:12:00.707ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=1
22742025-03-01T00:12:00.709ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "43007899-cca6-4b88-a6d4-532eee40f261", "content-length": "109", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22752025-03-01T00:12:00.721ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=0
22762025-03-01T00:12:00.739ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "7bbc9bbe-d547-4827-aef0-a80200b18160", "content-length": "169", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22772025-03-01T00:12:00.742ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=1
22782025-03-01T00:12:00.743ZDEBGtest_instance_serial (InternalApi): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229, time_created: 2025-03-01T00:11:55.931359Z, time_modified: 2025-03-01T00:11:55.931359Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "sim-b6d65341", part_number: "Unknown", revision: SqlU32(0), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(38105), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(34345) }]
22792025-03-01T00:12:00.743ZDEBGtest_instance_serial (InternalApi): sending firewall rules to sled agents
22802025-03-01T00:12:00.743ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22812025-03-01T00:12:00.743ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22822025-03-01T00:12:00.744ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22832025-03-01T00:12:00.747ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "1084d32e-b6c8-42a6-bed5-aa4b6e2c8789", "content-length": "169", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22842025-03-01T00:12:00.748ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=0
22852025-03-01T00:12:00.748ZTRACtest_instance_serial (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
22862025-03-01T00:12:00.748ZTRACtest_instance_serial (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22872025-03-01T00:12:00.748ZTRACtest_instance_serial (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database
22882025-03-01T00:12:00.748ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {} }
22892025-03-01T00:12:00.748ZDEBGtest_instance_serial (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Database result = Ok(())
22902025-03-01T00:12:00.755ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e6f16be9-7e44-4a81-93cb-d501fc8cc989", "content-length": "178", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22912025-03-01T00:12:00.756ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=1
22922025-03-01T00:12:00.756ZDEBGtest_instance_serial (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22932025-03-01T00:12:00.756ZDEBGtest_instance_serial (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
22942025-03-01T00:12:00.795ZDEBGtest_instance_serial (InternalApi): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:38105/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
22952025-03-01T00:12:00.796ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50038 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
22962025-03-01T00:12:00.797ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50038 req_id = 6cb9f174-a6b9-4beb-93c5-94992fd82272 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
22972025-03-01T00:12:00.797ZINFOtest_instance_serial (dropshot): request completed latency_us = 743 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50038 req_id = 6cb9f174-a6b9-4beb-93c5-94992fd82272 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
22982025-03-01T00:12:00.798ZDEBGtest_instance_serial (InternalApi): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:38105/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "6cb9f174-a6b9-4beb-93c5-94992fd82272", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
22992025-03-01T00:12:00.799ZINFOtest_instance_serial (InternalApi): updated firewall rules on 1 sleds
23002025-03-01T00:12:00.799ZINFOtest_instance_serial (nexus): plumbed initial IP allowlist
23012025-03-01T00:12:00.840ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = / versions = all
23022025-03-01T00:12:00.840ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /access versions = all
23032025-03-01T00:12:00.840ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /assets/{path} versions = all
23042025-03-01T00:12:00.840ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /device/auth versions = all
23052025-03-01T00:12:00.840ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /device/confirm versions = all
23062025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /device/success versions = all
23072025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /device/token versions = all
23082025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /device/verify versions = all
23092025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /experimental/v1/probes versions = all
23102025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /experimental/v1/probes versions = all
23112025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /experimental/v1/probes/{probe} versions = all
23122025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /experimental/v1/probes/{probe} versions = all
23132025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /experimental/v1/system/support-bundles versions = all
23142025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /experimental/v1/system/support-bundles versions = all
23152025-03-01T00:12:00.841ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
23162025-03-01T00:12:00.842ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
23172025-03-01T00:12:00.842ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
23182025-03-01T00:12:00.842ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
23192025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
23202025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
23212025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/index versions = all
23222025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /images versions = all
23232025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /login versions = all
23242025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /login/{silo_name}/local versions = all
23252025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
23262025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
23272025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
23282025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /lookup/{path} versions = all
23292025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /projects/{path} versions = all
23302025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /projects-new versions = all
23312025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /settings/{path} versions = all
23322025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /system/{path} versions = all
23332025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /utilization versions = all
23342025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/certificates versions = all
23352025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/certificates versions = all
23362025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/certificates/{certificate} versions = all
23372025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/certificates/{certificate} versions = all
23382025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/disks versions = all
23392025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/disks versions = all
23402025-03-01T00:12:00.843ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/disks/{disk} versions = all
23412025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/disks/{disk} versions = all
23422025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/disks/{disk}/bulk-write versions = all
23432025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
23442025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
23452025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/disks/{disk}/finalize versions = all
23462025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/disks/{disk}/metrics/{metric} versions = all
23472025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/floating-ips versions = all
23482025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/floating-ips versions = all
23492025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
23502025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/floating-ips/{floating_ip} versions = all
23512025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
23522025-03-01T00:12:00.844ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
23532025-03-01T00:12:00.845ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
23542025-03-01T00:12:00.845ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/groups versions = all
23552025-03-01T00:12:00.845ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/groups/{group_id} versions = all
23562025-03-01T00:12:00.845ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/images versions = all
23572025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/images versions = all
23582025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/images/{image} versions = all
23592025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/images/{image} versions = all
23602025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/images/{image}/demote versions = all
23612025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/images/{image}/promote versions = all
23622025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/instances versions = all
23632025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/instances versions = all
23642025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/instances/{instance} versions = all
23652025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/instances/{instance} versions = all
23662025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/instances/{instance} versions = all
23672025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/instances/{instance}/disks versions = all
23682025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/instances/{instance}/disks/attach versions = all
23692025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/instances/{instance}/disks/detach versions = all
23702025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/instances/{instance}/external-ips versions = all
23712025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
23722025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all
23732025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/instances/{instance}/reboot versions = all
23742025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/instances/{instance}/serial-console versions = all
23752025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
23762025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
23772025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/instances/{instance}/start versions = all
23782025-03-01T00:12:00.846ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/instances/{instance}/stop versions = all
23792025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/internet-gateway-ip-addresses versions = all
23802025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/internet-gateway-ip-addresses versions = all
23812025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
23822025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/internet-gateway-ip-pools versions = all
23832025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/internet-gateway-ip-pools versions = all
23842025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
23852025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/internet-gateways versions = all
23862025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/internet-gateways versions = all
23872025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
23882025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/internet-gateways/{gateway} versions = all
23892025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/ip-pools versions = all
23902025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/ip-pools/{pool} versions = all
23912025-03-01T00:12:00.847ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/login/{silo_name}/local versions = all
23922025-03-01T00:12:00.852ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/logout versions = all
23932025-03-01T00:12:00.852ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/me versions = all
23942025-03-01T00:12:00.852ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/me/groups versions = all
23952025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/me/ssh-keys versions = all
23962025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/me/ssh-keys versions = all
23972025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
23982025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
23992025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/metrics/{metric_name} versions = all
24002025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/network-interfaces versions = all
24012025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/network-interfaces versions = all
24022025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/network-interfaces/{interface} versions = all
24032025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/network-interfaces/{interface} versions = all
24042025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/network-interfaces/{interface} versions = all
24052025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/ping versions = all
24062025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/policy versions = all
24072025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/policy versions = all
24082025-03-01T00:12:00.853ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/projects versions = all
24092025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/projects versions = all
24102025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/projects/{project} versions = all
24112025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/projects/{project} versions = all
24122025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/projects/{project} versions = all
24132025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/projects/{project}/policy versions = all
24142025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/projects/{project}/policy versions = all
24152025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/snapshots versions = all
24162025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/snapshots versions = all
24172025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/snapshots/{snapshot} versions = all
24182025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/snapshots/{snapshot} versions = all
24192025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/disks versions = all
24202025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
24212025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
24222025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/racks versions = all
24232025-03-01T00:12:00.854ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
24242025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/sleds versions = all
24252025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/hardware/sleds versions = all
24262025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
24272025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
24282025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
24292025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
24302025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
24312025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/switch-port versions = all
24322025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
24332025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
24342025-03-01T00:12:00.855ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
24352025-03-01T00:12:00.856ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
24362025-03-01T00:12:00.856ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
24372025-03-01T00:12:00.856ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/switches versions = all
24382025-03-01T00:12:00.856ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
24392025-03-01T00:12:00.856ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/identity-providers versions = all
24402025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/identity-providers/local/users versions = all
24412025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
24422025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
24432025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/identity-providers/saml versions = all
24442025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
24452025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/ip-pools versions = all
24462025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/ip-pools versions = all
24472025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
24482025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/ip-pools/{pool} versions = all
24492025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/ip-pools/{pool} versions = all
24502025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
24512025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
24522025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
24532025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
24542025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
24552025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
24562025-03-01T00:12:00.857ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
24572025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
24582025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/ip-pools-service versions = all
24592025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/ip-pools-service/ranges versions = all
24602025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
24612025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
24622025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/metrics/{metric_name} versions = all
24632025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/address-lot versions = all
24642025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/networking/address-lot versions = all
24652025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
24662025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
24672025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/allow-list versions = all
24682025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/networking/allow-list versions = all
24692025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/networking/bfd-disable versions = all
24702025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/networking/bfd-enable versions = all
24712025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/bfd-status versions = all
24722025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/networking/bgp versions = all
24732025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/bgp versions = all
24742025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/networking/bgp versions = all
24752025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/bgp-announce-set versions = all
24762025-03-01T00:12:00.858ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
24772025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
24782025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
24792025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/bgp-exported versions = all
24802025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/bgp-message-history versions = all
24812025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
24822025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/bgp-status versions = all
24832025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/loopback-address versions = all
24842025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/networking/loopback-address versions = all
24852025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
24862025-03-01T00:12:00.859ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
24872025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/switch-port-settings versions = all
24882025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/networking/switch-port-settings versions = all
24892025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
24902025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/policy versions = all
24912025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/policy versions = all
24922025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/roles versions = all
24932025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/roles/{role_name} versions = all
24942025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/silo-quotas versions = all
24952025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/silos versions = all
24962025-03-01T00:12:00.860ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/silos versions = all
24972025-03-01T00:12:00.861ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/system/silos/{silo} versions = all
24982025-03-01T00:12:00.861ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/silos/{silo} versions = all
24992025-03-01T00:12:00.861ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all
25002025-03-01T00:12:00.861ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/silos/{silo}/policy versions = all
25012025-03-01T00:12:00.861ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/silos/{silo}/policy versions = all
25022025-03-01T00:12:00.861ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/silos/{silo}/quotas versions = all
25032025-03-01T00:12:00.861ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
25042025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/system/timeseries/query versions = all
25052025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/timeseries/schemas versions = all
25062025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/system/update/repository versions = all
25072025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/update/repository/{system_version} versions = all
25082025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/users versions = all
25092025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/users/{user_id} versions = all
25102025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/users-builtin versions = all
25112025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/users-builtin/{user} versions = all
25122025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/utilization/silos versions = all
25132025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/system/utilization/silos/{silo} versions = all
25142025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/timeseries/query versions = all
25152025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/users versions = all
25162025-03-01T00:12:00.862ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/utilization versions = all
25172025-03-01T00:12:00.863ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpc-firewall-rules versions = all
25182025-03-01T00:12:00.863ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/vpc-firewall-rules versions = all
25192025-03-01T00:12:00.863ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpc-router-routes versions = all
25202025-03-01T00:12:00.863ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/vpc-router-routes versions = all
25212025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
25222025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpc-router-routes/{route} versions = all
25232025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/vpc-router-routes/{route} versions = all
25242025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpc-routers versions = all
25252025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/vpc-routers versions = all
25262025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/vpc-routers/{router} versions = all
25272025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpc-routers/{router} versions = all
25282025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/vpc-routers/{router} versions = all
25292025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpc-subnets versions = all
25302025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/vpc-subnets versions = all
25312025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
25322025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpc-subnets/{subnet} versions = all
25332025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
25342025-03-01T00:12:00.864ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all
25352025-03-01T00:12:00.865ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpcs versions = all
25362025-03-01T00:12:00.865ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = POST path = /v1/vpcs versions = all
25372025-03-01T00:12:00.866ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = DELETE path = /v1/vpcs/{vpc} versions = all
25382025-03-01T00:12:00.866ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = GET path = /v1/vpcs/{vpc} versions = all
25392025-03-01T00:12:00.866ZDEBGtest_instance_serial (dropshot_external): registered endpoint local_addr = 127.0.0.1:43509 method = PUT path = /v1/vpcs/{vpc} versions = all
25402025-03-01T00:12:00.866ZINFOtest_instance_serial (dropshot_external): listening local_addr = 127.0.0.1:43509
25412025-03-01T00:12:00.866ZDEBGtest_instance_serial (dropshot_external): successfully registered DTrace USDT probes local_addr = 127.0.0.1:43509
25422025-03-01T00:12:00.912ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = / versions = all
25432025-03-01T00:12:00.913ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /access versions = all
25442025-03-01T00:12:00.913ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /assets/{path} versions = all
25452025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /device/auth versions = all
25462025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /device/confirm versions = all
25472025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /device/success versions = all
25482025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /device/token versions = all
25492025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /device/verify versions = all
25502025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /experimental/v1/probes versions = all
25512025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /experimental/v1/probes versions = all
25522025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /experimental/v1/probes/{probe} versions = all
25532025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /experimental/v1/probes/{probe} versions = all
25542025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /experimental/v1/system/support-bundles versions = all
25552025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /experimental/v1/system/support-bundles versions = all
25562025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
25572025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /experimental/v1/system/support-bundles/{support_bundle} versions = all
25582025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
25592025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download versions = all
25602025-03-01T00:12:00.914ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
25612025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = HEAD path = /experimental/v1/system/support-bundles/{support_bundle}/download/{file} versions = all
25622025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /experimental/v1/system/support-bundles/{support_bundle}/index versions = all
25632025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /images versions = all
25642025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /login versions = all
25652025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /login/{silo_name}/local versions = all
25662025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
25672025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
25682025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
25692025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /lookup/{path} versions = all
25702025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /projects/{path} versions = all
25712025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /projects-new versions = all
25722025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /settings/{path} versions = all
25732025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /system/{path} versions = all
25742025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /utilization versions = all
25752025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/certificates versions = all
25762025-03-01T00:12:00.915ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/certificates versions = all
25772025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/certificates/{certificate} versions = all
25782025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/certificates/{certificate} versions = all
25792025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/disks versions = all
25802025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/disks versions = all
25812025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/disks/{disk} versions = all
25822025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/disks/{disk} versions = all
25832025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/disks/{disk}/bulk-write versions = all
25842025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
25852025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
25862025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/disks/{disk}/finalize versions = all
25872025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/disks/{disk}/metrics/{metric} versions = all
25882025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/floating-ips versions = all
25892025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/floating-ips versions = all
25902025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
25912025-03-01T00:12:00.916ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/floating-ips/{floating_ip} versions = all
25922025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
25932025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
25942025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
25952025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/groups versions = all
25962025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/groups/{group_id} versions = all
25972025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/images versions = all
25982025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/images versions = all
25992025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/images/{image} versions = all
26002025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/images/{image} versions = all
26012025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/images/{image}/demote versions = all
26022025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/images/{image}/promote versions = all
26032025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/instances versions = all
26042025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/instances versions = all
26052025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/instances/{instance} versions = all
26062025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/instances/{instance} versions = all
26072025-03-01T00:12:00.917ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/instances/{instance} versions = all
26082025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/instances/{instance}/disks versions = all
26092025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/instances/{instance}/disks/attach versions = all
26102025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/instances/{instance}/disks/detach versions = all
26112025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/instances/{instance}/external-ips versions = all
26122025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
26132025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all
26142025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/instances/{instance}/reboot versions = all
26152025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/instances/{instance}/serial-console versions = all
26162025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
26172025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
26182025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/instances/{instance}/start versions = all
26192025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/instances/{instance}/stop versions = all
26202025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/internet-gateway-ip-addresses versions = all
26212025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/internet-gateway-ip-addresses versions = all
26222025-03-01T00:12:00.918ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
26232025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/internet-gateway-ip-pools versions = all
26242025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/internet-gateway-ip-pools versions = all
26252025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
26262025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/internet-gateways versions = all
26272025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/internet-gateways versions = all
26282025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
26292025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/internet-gateways/{gateway} versions = all
26302025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/ip-pools versions = all
26312025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/ip-pools/{pool} versions = all
26322025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/login/{silo_name}/local versions = all
26332025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/logout versions = all
26342025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/me versions = all
26352025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/me/groups versions = all
26362025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/me/ssh-keys versions = all
26372025-03-01T00:12:00.919ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/me/ssh-keys versions = all
26382025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
26392025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
26402025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/metrics/{metric_name} versions = all
26412025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/network-interfaces versions = all
26422025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/network-interfaces versions = all
26432025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/network-interfaces/{interface} versions = all
26442025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/network-interfaces/{interface} versions = all
26452025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/network-interfaces/{interface} versions = all
26462025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/ping versions = all
26472025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/policy versions = all
26482025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/policy versions = all
26492025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/projects versions = all
26502025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/projects versions = all
26512025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/projects/{project} versions = all
26522025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/projects/{project} versions = all
26532025-03-01T00:12:00.920ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/projects/{project} versions = all
26542025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/projects/{project}/policy versions = all
26552025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/projects/{project}/policy versions = all
26562025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/snapshots versions = all
26572025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/snapshots versions = all
26582025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/snapshots/{snapshot} versions = all
26592025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/snapshots/{snapshot} versions = all
26602025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/disks versions = all
26612025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
26622025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
26632025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/racks versions = all
26642025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
26652025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/sleds versions = all
26662025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/hardware/sleds versions = all
26672025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
26682025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
26692025-03-01T00:12:00.921ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
26702025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
26712025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
26722025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/switch-port versions = all
26732025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
26742025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
26752025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
26762025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
26772025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
26782025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/switches versions = all
26792025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
26802025-03-01T00:12:00.922ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/identity-providers versions = all
26812025-03-01T00:12:00.923ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/identity-providers/local/users versions = all
26822025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
26832025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
26842025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/identity-providers/saml versions = all
26852025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
26862025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/ip-pools versions = all
26872025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/ip-pools versions = all
26882025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
26892025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/ip-pools/{pool} versions = all
26902025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/ip-pools/{pool} versions = all
26912025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
26922025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
26932025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
26942025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
26952025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
26962025-03-01T00:12:00.924ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
26972025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
26982025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
26992025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/ip-pools-service versions = all
27002025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/ip-pools-service/ranges versions = all
27012025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
27022025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
27032025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/metrics/{metric_name} versions = all
27042025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/address-lot versions = all
27052025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/networking/address-lot versions = all
27062025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
27072025-03-01T00:12:00.925ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
27082025-03-01T00:12:00.927ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/allow-list versions = all
27092025-03-01T00:12:00.927ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/networking/allow-list versions = all
27102025-03-01T00:12:00.927ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/networking/bfd-disable versions = all
27112025-03-01T00:12:00.927ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/networking/bfd-enable versions = all
27122025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/bfd-status versions = all
27132025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/networking/bgp versions = all
27142025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/bgp versions = all
27152025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/networking/bgp versions = all
27162025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/bgp-announce-set versions = all
27172025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
27182025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
27192025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
27202025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/bgp-exported versions = all
27212025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/bgp-message-history versions = all
27222025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
27232025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/bgp-status versions = all
27242025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/loopback-address versions = all
27252025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/networking/loopback-address versions = all
27262025-03-01T00:12:00.928ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
27272025-03-01T00:12:00.929ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
27282025-03-01T00:12:00.929ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/switch-port-settings versions = all
27292025-03-01T00:12:00.929ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/networking/switch-port-settings versions = all
27302025-03-01T00:12:00.929ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
27312025-03-01T00:12:00.929ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/policy versions = all
27322025-03-01T00:12:00.929ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/policy versions = all
27332025-03-01T00:12:00.931ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/roles versions = all
27342025-03-01T00:12:00.932ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/roles/{role_name} versions = all
27352025-03-01T00:12:00.932ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/silo-quotas versions = all
27362025-03-01T00:12:00.932ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/silos versions = all
27372025-03-01T00:12:00.932ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/silos versions = all
27382025-03-01T00:12:00.932ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/system/silos/{silo} versions = all
27392025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/silos/{silo} versions = all
27402025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all
27412025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/silos/{silo}/policy versions = all
27422025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/silos/{silo}/policy versions = all
27432025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/silos/{silo}/quotas versions = all
27442025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
27452025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/system/timeseries/query versions = all
27462025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/timeseries/schemas versions = all
27472025-03-01T00:12:00.933ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/system/update/repository versions = all
27482025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/update/repository/{system_version} versions = all
27492025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/users versions = all
27502025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/users/{user_id} versions = all
27512025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/users-builtin versions = all
27522025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/users-builtin/{user} versions = all
27532025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/utilization/silos versions = all
27542025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/system/utilization/silos/{silo} versions = all
27552025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/timeseries/query versions = all
27562025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/users versions = all
27572025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/utilization versions = all
27582025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpc-firewall-rules versions = all
27592025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/vpc-firewall-rules versions = all
27602025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpc-router-routes versions = all
27612025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/vpc-router-routes versions = all
27622025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
27632025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpc-router-routes/{route} versions = all
27642025-03-01T00:12:00.934ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/vpc-router-routes/{route} versions = all
27652025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpc-routers versions = all
27662025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/vpc-routers versions = all
27672025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/vpc-routers/{router} versions = all
27682025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpc-routers/{router} versions = all
27692025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/vpc-routers/{router} versions = all
27702025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpc-subnets versions = all
27712025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/vpc-subnets versions = all
27722025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
27732025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpc-subnets/{subnet} versions = all
27742025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
27752025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all
27762025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpcs versions = all
27772025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = POST path = /v1/vpcs versions = all
27782025-03-01T00:12:00.935ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = DELETE path = /v1/vpcs/{vpc} versions = all
27792025-03-01T00:12:00.936ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = GET path = /v1/vpcs/{vpc} versions = all
27802025-03-01T00:12:00.937ZDEBGtest_instance_serial (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:45441 method = PUT path = /v1/vpcs/{vpc} versions = all
27812025-03-01T00:12:00.937ZINFOtest_instance_serial (dropshot_external_techport): listening local_addr = 127.0.0.1:45441
27822025-03-01T00:12:00.937ZDEBGtest_instance_serial (dropshot_external_techport): successfully registered DTrace USDT probes local_addr = 127.0.0.1:45441
27832025-03-01T00:12:00.937ZDEBGtest_instance_serial (nexus-producer-server): registered DTrace probes
27842025-03-01T00:12:00.937ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = 127.0.0.1:43677 method = GET path = /{producer_id} versions = all
27852025-03-01T00:12:00.937ZINFOtest_instance_serial (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.15.1/src/server.rs:328 local_addr = 127.0.0.1:43677
27862025-03-01T00:12:00.937ZDEBGtest_instance_serial (dropshot): successfully registered DTrace USDT probes local_addr = 127.0.0.1:43677
27872025-03-01T00:12:00.937ZDEBGtest_instance_serial (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:43677
27882025-03-01T00:12:00.937ZDEBGtest_instance_serial (nexus-producer-server): Nexus IP provided explicitly, will use it addr = 127.0.0.1:41715
27892025-03-01T00:12:00.937ZDEBGtest_instance_serial (nexus-producer-server): starting producer registration task
27902025-03-01T00:12:00.937ZINFOtest_instance_serial (nexus-producer-server): starting oximeter metric producer server address = 127.0.0.1:43677 file = oximeter/producer/src/lib.rs:279 interval = 10s producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
27912025-03-01T00:12:00.937ZDEBGtest_instance_serial (init_with_steps): Running step start_oximeter
27922025-03-01T00:12:00.937ZDEBGtest_instance_serial: Starting Oximeter
27932025-03-01T00:12:00.937ZDEBGtest_instance_serial (oximeter): registered DTrace probes
27942025-03-01T00:12:00.937ZINFOtest_instance_serial (oximeter): starting oximeter server file = oximeter/collector/src/lib.rs:236
27952025-03-01T00:12:00.937ZDEBGtest_instance_serial (oximeter): creating ClickHouse client
27962025-03-01T00:12:00.937ZDEBGtest_instance_serial (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
27972025-03-01T00:12:00.938ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = SELECT MAX(value) AS max_version FROM oximeter.version;
27982025-03-01T00:12:00.938ZDEBGtest_instance_serial (producer-registration-task): registering / renewing oximeter producer lease with Nexus
27992025-03-01T00:12:00.938ZDEBGtest_instance_serial (producer-registration-task): using nexus address for registration addr = 127.0.0.1:41715
28002025-03-01T00:12:00.969ZDEBGtest_instance_serial (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:41715/metrics/producers
28012025-03-01T00:12:00.970ZINFOtest_instance_serial (dropshot_internal): accepted connection local_addr = 127.0.0.1:41715 remote_addr = 127.0.0.1:42648
28022025-03-01T00:12:00.971ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42648 req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4 uri = /metrics/producers
28032025-03-01T00:12:00.971ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42648 req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4 resource = Database uri = /metrics/producers
28042025-03-01T00:12:00.972ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42648 req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4 roles = RoleSet { roles: {} } uri = /metrics/producers
28052025-03-01T00:12:00.972ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42648 req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4 resource = Database result = Ok(()) uri = /metrics/producers
28062025-03-01T00:12:00.973ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "3e4ce484-784d-4a10-b205-89091dd9b6e0", "content-length": "178", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
28072025-03-01T00:12:00.974ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/cmpa
28082025-03-01T00:12:00.975ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9dc5aba9-dc4f-4f04-a418-42a049df1a3b", "content-length": "702", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
28092025-03-01T00:12:00.975ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
28102025-03-01T00:12:00.978ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b91cbf85-90a6-4dc6-b85c-2635ad3919d7", "content-length": "727", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
28112025-03-01T00:12:00.978ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
28122025-03-01T00:12:00.980ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b1fadde1-a8b7-4e81-acdc-b50cb4ee8b1f", "content-length": "729", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
28132025-03-01T00:12:00.981ZDEBGtest_instance_serial (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:39563 method = GET uri = http://[::1]:39563/sp/sled/1/component/rot/cfpa
28142025-03-01T00:12:00.981ZWARNtest_instance_serial (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:823 id = 46c7197b-e099-494b-a693-296ecb919b0c
28152025-03-01T00:12:00.981ZDEBGtest_instance_serial (oximeter-agent): oximeter database does not exist, creating collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
28162025-03-01T00:12:00.981ZINFOtest_instance_serial (clickhouse-client): reading db version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:732 id = 46c7197b-e099-494b-a693-296ecb919b0c
28172025-03-01T00:12:00.981ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = SELECT MAX(value) AS max_version FROM oximeter.version;
28182025-03-01T00:12:00.983ZDEBGtest_instance_serial (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:39563 result = Ok(Response { url: "http://[::1]:39563/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9254ec8-8578-4415-8fed-4770b70f12f3", "content-length": "728", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
28192025-03-01T00:12:00.984ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
28202025-03-01T00:12:00.984ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28212025-03-01T00:12:00.984ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
28222025-03-01T00:12:00.984ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
28232025-03-01T00:12:00.984ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
28242025-03-01T00:12:00.984ZWARNtest_instance_serial (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:823 id = 46c7197b-e099-494b-a693-296ecb919b0c
28252025-03-01T00:12:00.984ZINFOtest_instance_serial (clickhouse-client): read oximeter database version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:736 id = 46c7197b-e099-494b-a693-296ecb919b0c version = 0
28262025-03-01T00:12:00.984ZINFOtest_instance_serial (clickhouse-client): wiping and re-initializing oximeter schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:741 id = 46c7197b-e099-494b-a693-296ecb919b0c
28272025-03-01T00:12:00.985ZDEBGtest_instance_serial (clickhouse-client): wiping ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
28282025-03-01T00:12:00.986ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = DROP DATABASE IF EXISTS oximeter
28292025-03-01T00:12:00.986ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28302025-03-01T00:12:00.989ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
28312025-03-01T00:12:00.990ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet
28322025-03-01T00:12:00.990ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28332025-03-01T00:12:00.990ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
28342025-03-01T00:12:00.990ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
28352025-03-01T00:12:00.990ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
28362025-03-01T00:12:00.990ZDEBGtest_instance_serial (clickhouse-client): initializing ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
28372025-03-01T00:12:00.990ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = CREATE DATABASE IF NOT EXISTS oximeter
28382025-03-01T00:12:00.992ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28392025-03-01T00:12:00.996ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Fleet result = Ok(())
28402025-03-01T00:12:00.996ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
28412025-03-01T00:12:00.996ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
28422025-03-01T00:12:00.997ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
28432025-03-01T00:12:01.000ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
28442025-03-01T00:12:01.022ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28452025-03-01T00:12:01.043ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28462025-03-01T00:12:01.056ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28472025-03-01T00:12:01.067ZINFOtest_instance_serial (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 94001 local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42648 req_id = 892979d7-d9da-4c80-b5b2-67c29f7a13a4 response_code = 503 uri = /metrics/producers
28482025-03-01T00:12:01.067ZDEBGtest_instance_serial (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "892979d7-d9da-4c80-b5b2-67c29f7a13a4", "content-length": "133", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
28492025-03-01T00:12:01.067ZWARNtest_instance_serial (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 250.833232ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"892979d7-d9da-4c80-b5b2-67c29f7a13a4\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Sat, 01 Mar 2025 00:12:00 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"892979d7-d9da-4c80-b5b2-67c29f7a13a4\\" }" file = oximeter/producer/src/lib.rs:420
28502025-03-01T00:12:01.073ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28512025-03-01T00:12:01.086ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28522025-03-01T00:12:01.095ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28532025-03-01T00:12:01.121ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28542025-03-01T00:12:01.181ZDEBGtest_instance_serial (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:38105
28552025-03-01T00:12:01.185ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = http://[::1]:38105 background_task = inventory_collection body = None method = GET uri = http://[::1]:38105/inventory
28562025-03-01T00:12:01.188ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28572025-03-01T00:12:01.189ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50040 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
28582025-03-01T00:12:01.192ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = GET remote_addr = [::1]:50040 req_id = 1d62854f-d8b0-4137-99ce-3cb1191e4242 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
28592025-03-01T00:12:01.194ZINFOtest_instance_serial (dropshot): request completed latency_us = 2043 local_addr = [::1]:38105 method = GET remote_addr = [::1]:50040 req_id = 1d62854f-d8b0-4137-99ce-3cb1191e4242 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
28602025-03-01T00:12:01.195ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = http://[::1]:38105 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:38105/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "1d62854f-d8b0-4137-99ce-3cb1191e4242", "content-length": "2517", "date": "Sat, 01 Mar 2025 00:12:00 GMT"} })
28612025-03-01T00:12:01.200ZDEBGtest_instance_serial (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
28622025-03-01T00:12:01.200ZDEBGtest_instance_serial (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
28632025-03-01T00:12:01.200ZDEBGtest_instance_serial (BackgroundTasks): finished collection background_task = inventory_collection
28642025-03-01T00:12:01.206ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory
28652025-03-01T00:12:01.209ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28662025-03-01T00:12:01.209ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
28672025-03-01T00:12:01.209ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
28682025-03-01T00:12:01.209ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
28692025-03-01T00:12:01.210ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28702025-03-01T00:12:01.211ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28712025-03-01T00:12:01.216ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Inventory result = Ok(())
28722025-03-01T00:12:01.217ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database
28732025-03-01T00:12:01.233ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
28742025-03-01T00:12:01.234ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = inventory_collection resource = Database result = Ok(())
28752025-03-01T00:12:01.248ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28762025-03-01T00:12:01.261ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28772025-03-01T00:12:01.273ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28782025-03-01T00:12:01.288ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28792025-03-01T00:12:01.302ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28802025-03-01T00:12:01.461ZDEBGtest_instance_serial (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:41715/metrics/producers
28812025-03-01T00:12:01.461ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28822025-03-01T00:12:01.461ZINFOtest_instance_serial (dropshot_internal): accepted connection local_addr = 127.0.0.1:41715 remote_addr = 127.0.0.1:42650
28832025-03-01T00:12:01.464ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42650 req_id = 992da154-d0b9-4297-854d-df8c5208b58d uri = /metrics/producers
28842025-03-01T00:12:01.466ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42650 req_id = 992da154-d0b9-4297-854d-df8c5208b58d resource = Database uri = /metrics/producers
28852025-03-01T00:12:01.468ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42650 req_id = 992da154-d0b9-4297-854d-df8c5208b58d roles = RoleSet { roles: {} } uri = /metrics/producers
28862025-03-01T00:12:01.469ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42650 req_id = 992da154-d0b9-4297-854d-df8c5208b58d resource = Database result = Ok(()) uri = /metrics/producers
28872025-03-01T00:12:01.473ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28882025-03-01T00:12:01.477ZINFOtest_instance_serial (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 12871 local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42650 req_id = 992da154-d0b9-4297-854d-df8c5208b58d response_code = 503 uri = /metrics/producers
28892025-03-01T00:12:01.479ZDEBGtest_instance_serial (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "992da154-d0b9-4297-854d-df8c5208b58d", "content-length": "133", "date": "Sat, 01 Mar 2025 00:12:01 GMT"} })
28902025-03-01T00:12:01.479ZWARNtest_instance_serial (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 344.383643ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"992da154-d0b9-4297-854d-df8c5208b58d\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Sat, 01 Mar 2025 00:12:01 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"992da154-d0b9-4297-854d-df8c5208b58d\\" }" file = oximeter/producer/src/lib.rs:420
28912025-03-01T00:12:01.490ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28922025-03-01T00:12:01.503ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28932025-03-01T00:12:01.521ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28942025-03-01T00:12:01.534ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28952025-03-01T00:12:01.548ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28962025-03-01T00:12:01.573ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28972025-03-01T00:12:01.591ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28982025-03-01T00:12:01.612ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
28992025-03-01T00:12:01.625ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29002025-03-01T00:12:01.644ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29012025-03-01T00:12:01.660ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
29022025-03-01T00:12:01.674ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29032025-03-01T00:12:01.688ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29042025-03-01T00:12:01.704ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29052025-03-01T00:12:01.725ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29062025-03-01T00:12:01.742ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29072025-03-01T00:12:01.768ZINFOtest_instance_serial (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = d27b7f2c-fd67-458f-9375-8bd050b3b83a
29082025-03-01T00:12:01.768ZDEBGtest_instance_serial (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = d27b7f2c-fd67-458f-9375-8bd050b3b83a time_started = 2025-03-01 00:12:00.447452 UTC
29092025-03-01T00:12:01.768ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 1.447276113s iteration = 3 status = {"collection_id":"d27b7f2c-fd67-458f-9375-8bd050b3b83a","time_done":"2025-03-01 00:12:01.200219 UTC","time_started":"2025-03-01 00:12:00.447452 UTC"}
29102025-03-01T00:12:01.778ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 3 reason = Dependency
29112025-03-01T00:12:01.778ZWARNtest_instance_serial (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
29122025-03-01T00:12:01.778ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 67.261\u{b5}s iteration = 3 status = {"error":"no blueprint"}
29132025-03-01T00:12:01.778ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 3 reason = Dependency
29142025-03-01T00:12:01.778ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 13.83\u{b5}s iteration = 3 status = {"error":"task disabled"}
29152025-03-01T00:12:01.778ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29162025-03-01T00:12:01.821ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29172025-03-01T00:12:01.975ZDEBGtest_instance_serial (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:41715/metrics/producers
29182025-03-01T00:12:01.988ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29192025-03-01T00:12:01.988ZINFOtest_instance_serial (dropshot_internal): accepted connection local_addr = 127.0.0.1:41715 remote_addr = 127.0.0.1:42652
29202025-03-01T00:12:01.989ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42652 req_id = d2de0b00-210e-4049-aad7-9238b4932296 uri = /metrics/producers
29212025-03-01T00:12:01.989ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42652 req_id = d2de0b00-210e-4049-aad7-9238b4932296 resource = Database uri = /metrics/producers
29222025-03-01T00:12:01.989ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42652 req_id = d2de0b00-210e-4049-aad7-9238b4932296 roles = RoleSet { roles: {} } uri = /metrics/producers
29232025-03-01T00:12:01.990ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42652 req_id = d2de0b00-210e-4049-aad7-9238b4932296 resource = Database result = Ok(()) uri = /metrics/producers
29242025-03-01T00:12:01.997ZINFOtest_instance_serial (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 8205 local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42652 req_id = d2de0b00-210e-4049-aad7-9238b4932296 response_code = 503 uri = /metrics/producers
29252025-03-01T00:12:01.999ZDEBGtest_instance_serial (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "d2de0b00-210e-4049-aad7-9238b4932296", "content-length": "133", "date": "Sat, 01 Mar 2025 00:12:01 GMT"} })
29262025-03-01T00:12:01.999ZWARNtest_instance_serial (producer-registration-task): failed to register as a producer with Nexus, will retry delay = 925.564303ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"d2de0b00-210e-4049-aad7-9238b4932296\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Sat, 01 Mar 2025 00:12:01 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"d2de0b00-210e-4049-aad7-9238b4932296\\" }" file = oximeter/producer/src/lib.rs:420
29272025-03-01T00:12:02.021ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29282025-03-01T00:12:02.031ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29292025-03-01T00:12:02.042ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29302025-03-01T00:12:02.054ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
29312025-03-01T00:12:02.066ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
29322025-03-01T00:12:02.084ZINFOtest_instance_serial (clickhouse-client): inserting current version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:764 id = 46c7197b-e099-494b-a693-296ecb919b0c version = 13
29332025-03-01T00:12:02.084ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = INSERT INTO oximeter.version (*) VALUES (13, now());
29342025-03-01T00:12:02.088ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:32909 method = GET path = /info versions = all
29352025-03-01T00:12:02.089ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:32909 method = GET path = /producers versions = all
29362025-03-01T00:12:02.089ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:32909 method = DELETE path = /producers/{producer_id} versions = all
29372025-03-01T00:12:02.089ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:32909 method = GET path = /producers/{producer_id} versions = all
29382025-03-01T00:12:02.089ZINFOtest_instance_serial (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.15.1/src/server.rs:328 local_addr = [::1]:32909
29392025-03-01T00:12:02.089ZDEBGtest_instance_serial (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:32909
29402025-03-01T00:12:02.089ZDEBGtest_instance_serial (oximeter): registered USDT probes
29412025-03-01T00:12:02.089ZDEBGtest_instance_serial (oximeter): contacting nexus
29422025-03-01T00:12:02.565ZDEBGtest_instance_serial (oximeter): client request body = Some(Body) method = POST uri = http://127.0.0.1:41715/metrics/collectors
29432025-03-01T00:12:02.565ZINFOtest_instance_serial (dropshot_internal): accepted connection local_addr = 127.0.0.1:41715 remote_addr = 127.0.0.1:42654
29442025-03-01T00:12:02.566ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42654 req_id = 21944226-275f-424f-b419-5519f5586a74 uri = /metrics/collectors
29452025-03-01T00:12:02.566ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42654 req_id = 21944226-275f-424f-b419-5519f5586a74 resource = Database uri = /metrics/collectors
29462025-03-01T00:12:02.579ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42654 req_id = 21944226-275f-424f-b419-5519f5586a74 roles = RoleSet { roles: {} } uri = /metrics/collectors
29472025-03-01T00:12:02.580ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42654 req_id = 21944226-275f-424f-b419-5519f5586a74 resource = Database result = Ok(()) uri = /metrics/collectors
29482025-03-01T00:12:02.587ZINFOtest_instance_serial (nexus): registered new oximeter metric collection server address = [::1]:32909 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
29492025-03-01T00:12:02.587ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 21683 local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42654 req_id = 21944226-275f-424f-b419-5519f5586a74 response_code = 204 uri = /metrics/collectors
29502025-03-01T00:12:02.588ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors", status: 204, headers: {"x-request-id": "21944226-275f-424f-b419-5519f5586a74", "date": "Sat, 01 Mar 2025 00:12:02 GMT"} })
29512025-03-01T00:12:02.588ZINFOtest_instance_serial (oximeter): oximeter registered with nexus file = oximeter/collector/src/lib.rs:383 id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
29522025-03-01T00:12:02.588ZDEBGtest_instance_serial (init_with_steps): Running step start_producer_server
29532025-03-01T00:12:02.588ZDEBGtest_instance_serial: Starting test metric Producer Server
29542025-03-01T00:12:02.589ZINFOtest_instance_serial: Starting mock propolis-server...
29552025-03-01T00:12:02.590ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:36473 method = GET path = /instance
29562025-03-01T00:12:02.590ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:36473 method = PUT path = /instance
29572025-03-01T00:12:02.590ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:36473 method = GET path = /instance/serial
29582025-03-01T00:12:02.590ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:36473 method = GET path = /instance/serial/history
29592025-03-01T00:12:02.590ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:36473 method = PUT path = /instance/state
29602025-03-01T00:12:02.590ZDEBGtest_instance_serial (dropshot): registered endpoint local_addr = [::1]:36473 method = GET path = /instance/state-monitor
29612025-03-01T00:12:02.590ZINFOtest_instance_serial (dropshot): listening local_addr = [::1]:36473
29622025-03-01T00:12:02.590ZDEBGtest_instance_serial (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:36473
29632025-03-01T00:12:02.643ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:43509/v1/system/ip-pools
29642025-03-01T00:12:02.644ZINFOtest_instance_serial (oximeter-agent): starting refresh list task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:471
29652025-03-01T00:12:02.683ZINFOtest_instance_serial (dropshot_external): accepted connection local_addr = 127.0.0.1:43509 remote_addr = 127.0.0.1:54780
29662025-03-01T00:12:02.683ZINFOtest_instance_serial (dropshot_internal): accepted connection local_addr = 127.0.0.1:41715 remote_addr = 127.0.0.1:42656
29672025-03-01T00:12:02.683ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
29682025-03-01T00:12:02.684ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
29692025-03-01T00:12:02.684ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42656 req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd uri = /metrics/producers
29702025-03-01T00:12:02.684ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = c0091c1c-938e-4a45-9d40-c398f5591267 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
29712025-03-01T00:12:02.685ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42656 req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd resource = Database uri = /metrics/producers
29722025-03-01T00:12:02.685ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42656 req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd roles = RoleSet { roles: {} } uri = /metrics/producers
29732025-03-01T00:12:02.686ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42656 req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd resource = Database result = Ok(()) uri = /metrics/producers
29742025-03-01T00:12:02.686ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = c0091c1c-938e-4a45-9d40-c398f5591267 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
29752025-03-01T00:12:02.686ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = c0091c1c-938e-4a45-9d40-c398f5591267 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
29762025-03-01T00:12:02.693ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = c0091c1c-938e-4a45-9d40-c398f5591267 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
29772025-03-01T00:12:02.693ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 uri = /v1/system/ip-pools
29782025-03-01T00:12:02.693ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 uri = /v1/system/ip-pools
29792025-03-01T00:12:02.693ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools
29802025-03-01T00:12:02.693ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
29812025-03-01T00:12:02.693ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
29822025-03-01T00:12:02.693ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
29832025-03-01T00:12:02.694ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
29842025-03-01T00:12:02.697ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
29852025-03-01T00:12:02.697ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
29862025-03-01T00:12:02.697ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
29872025-03-01T00:12:02.697ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
29882025-03-01T00:12:02.697ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
29892025-03-01T00:12:02.697ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
29902025-03-01T00:12:02.698ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
29912025-03-01T00:12:02.700ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29922025-03-01T00:12:02.700ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
29932025-03-01T00:12:02.700ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
29942025-03-01T00:12:02.701ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
29952025-03-01T00:12:02.703ZINFOtest_instance_serial (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
29962025-03-01T00:12:02.703ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 19050 local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42656 req_id = 3b82f922-e7d6-49b7-83f5-1468976793dd response_code = 201 uri = /metrics/producers
29972025-03-01T00:12:02.705ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
29982025-03-01T00:12:02.708ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
29992025-03-01T00:12:02.708ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30002025-03-01T00:12:02.708ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30012025-03-01T00:12:02.709ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30022025-03-01T00:12:02.709ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 25042 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = c0091c1c-938e-4a45-9d40-c398f5591267 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
30032025-03-01T00:12:02.710ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "c0091c1c-938e-4a45-9d40-c398f5591267", "content-length": "281", "date": "Sat, 01 Mar 2025 00:12:02 GMT"} })
30042025-03-01T00:12:02.711ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
30052025-03-01T00:12:02.711ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
30062025-03-01T00:12:02.712ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
30072025-03-01T00:12:02.712ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30082025-03-01T00:12:02.712ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30092025-03-01T00:12:02.712ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30102025-03-01T00:12:02.712ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
30112025-03-01T00:12:02.713ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
30122025-03-01T00:12:02.714ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
30132025-03-01T00:12:02.714ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
30142025-03-01T00:12:02.714ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30152025-03-01T00:12:02.714ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30162025-03-01T00:12:02.714ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30172025-03-01T00:12:02.715ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30182025-03-01T00:12:02.719ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 6671 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 5148cdb8-378f-4879-b6c2-b400a86a2dc6 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
30192025-03-01T00:12:02.720ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "5148cdb8-378f-4879-b6c2-b400a86a2dc6", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:02 GMT"} })
30202025-03-01T00:12:02.721ZDEBGtest_instance_serial (oximeter-agent): registered new metric producer address = [::1]:44275 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
30212025-03-01T00:12:02.768ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
30222025-03-01T00:12:02.770ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
30232025-03-01T00:12:02.772ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
30242025-03-01T00:12:02.772ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 uri = /v1/system/ip-pools
30252025-03-01T00:12:02.772ZTRACtest_instance_serial (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 resource = IpPoolList uri = /v1/system/ip-pools
30262025-03-01T00:12:02.772ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools
30272025-03-01T00:12:02.772ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 resource = Database uri = /v1/system/ip-pools
30282025-03-01T00:12:02.772ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
30292025-03-01T00:12:02.773ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 resource = Database result = Ok(()) uri = /v1/system/ip-pools
30302025-03-01T00:12:02.778ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 1 n_pruned_tasks = 0
30312025-03-01T00:12:02.791ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools
30322025-03-01T00:12:02.796ZDEBGtest_instance_serial (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools
30332025-03-01T00:12:02.796ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 resource = Database uri = /v1/system/ip-pools
30342025-03-01T00:12:02.797ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools
30352025-03-01T00:12:02.798ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 resource = Database result = Ok(()) uri = /v1/system/ip-pools
30362025-03-01T00:12:02.808ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 119439 local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 1f6179b1-6dba-452f-876a-9117b9361f91 response_code = 201 uri = /v1/system/ip-pools
30372025-03-01T00:12:02.809ZINFOtest_instance_serial (external client test context): client received response status = 201
30382025-03-01T00:12:02.810ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:43509/v1/system/ip-pools/default/ranges/add
30392025-03-01T00:12:02.810ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd uri = /v1/system/ip-pools/default/ranges/add
30402025-03-01T00:12:02.811ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd uri = /v1/system/ip-pools/default/ranges/add
30412025-03-01T00:12:02.811ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/ranges/add
30422025-03-01T00:12:02.811ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30432025-03-01T00:12:02.811ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30442025-03-01T00:12:02.812ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30452025-03-01T00:12:02.814ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30462025-03-01T00:12:02.814ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30472025-03-01T00:12:02.815ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30482025-03-01T00:12:02.816ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
30492025-03-01T00:12:02.817ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
30502025-03-01T00:12:02.817ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30512025-03-01T00:12:02.817ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30522025-03-01T00:12:02.817ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30532025-03-01T00:12:02.820ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30542025-03-01T00:12:02.820ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30552025-03-01T00:12:02.820ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30562025-03-01T00:12:02.820ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30572025-03-01T00:12:02.821ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
30582025-03-01T00:12:02.825ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
30592025-03-01T00:12:02.826ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30602025-03-01T00:12:02.826ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30612025-03-01T00:12:02.826ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30622025-03-01T00:12:02.828ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
30632025-03-01T00:12:02.828ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
30642025-03-01T00:12:02.828ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30652025-03-01T00:12:02.829ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30662025-03-01T00:12:02.829ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30672025-03-01T00:12:02.832ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30682025-03-01T00:12:02.834ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
30692025-03-01T00:12:02.834ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
30702025-03-01T00:12:02.834ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
30712025-03-01T00:12:02.834ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
30722025-03-01T00:12:02.837ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
30732025-03-01T00:12:02.837ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd uri = /v1/system/ip-pools/default/ranges/add
30742025-03-01T00:12:02.837ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database uri = /v1/system/ip-pools/default/ranges/add
30752025-03-01T00:12:02.839ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
30762025-03-01T00:12:02.839ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
30772025-03-01T00:12:02.840ZTRACtest_instance_serial (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/add
30782025-03-01T00:12:02.840ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/add
30792025-03-01T00:12:02.840ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database uri = /v1/system/ip-pools/default/ranges/add
30802025-03-01T00:12:02.841ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
30812025-03-01T00:12:02.841ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
30822025-03-01T00:12:02.843ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges/add
30832025-03-01T00:12:02.848ZDEBGtest_instance_serial (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
30842025-03-01T00:12:02.848ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database uri = /v1/system/ip-pools/default/ranges/add
30852025-03-01T00:12:02.848ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
30862025-03-01T00:12:02.849ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
30872025-03-01T00:12:02.851ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database uri = /v1/system/ip-pools/default/ranges/add
30882025-03-01T00:12:02.851ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
30892025-03-01T00:12:02.852ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
30902025-03-01T00:12:02.853ZTRACtest_instance_serial (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/ranges/add
30912025-03-01T00:12:02.854ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/ranges/add
30922025-03-01T00:12:02.854ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database uri = /v1/system/ip-pools/default/ranges/add
30932025-03-01T00:12:02.855ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/ranges/add
30942025-03-01T00:12:02.856ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
30952025-03-01T00:12:02.857ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/ranges/add
30962025-03-01T00:12:02.859ZDEBGtest_instance_serial (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/ranges/add
30972025-03-01T00:12:02.875ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 65241 local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = c63ff94f-9cfb-499f-a34e-4ad29cc75edd response_code = 201 uri = /v1/system/ip-pools/default/ranges/add
30982025-03-01T00:12:02.875ZINFOtest_instance_serial (external client test context): client received response status = 201
30992025-03-01T00:12:02.876ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:43509/v1/system/ip-pools/default/silos
31002025-03-01T00:12:02.876ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 uri = /v1/system/ip-pools/default/silos
31012025-03-01T00:12:02.877ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 uri = /v1/system/ip-pools/default/silos
31022025-03-01T00:12:02.877ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/system/ip-pools/default/silos
31032025-03-01T00:12:02.877ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31042025-03-01T00:12:02.877ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31052025-03-01T00:12:02.877ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31062025-03-01T00:12:02.879ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31072025-03-01T00:12:02.879ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31082025-03-01T00:12:02.880ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31092025-03-01T00:12:02.881ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
31102025-03-01T00:12:02.881ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
31112025-03-01T00:12:02.883ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31122025-03-01T00:12:02.884ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31132025-03-01T00:12:02.884ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31142025-03-01T00:12:02.884ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31152025-03-01T00:12:02.885ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31162025-03-01T00:12:02.885ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31172025-03-01T00:12:02.885ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31182025-03-01T00:12:02.888ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
31192025-03-01T00:12:02.891ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
31202025-03-01T00:12:02.896ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31212025-03-01T00:12:02.896ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31222025-03-01T00:12:02.896ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31232025-03-01T00:12:02.897ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
31242025-03-01T00:12:02.897ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
31252025-03-01T00:12:02.897ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31262025-03-01T00:12:02.897ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31272025-03-01T00:12:02.897ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31282025-03-01T00:12:02.898ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
31292025-03-01T00:12:02.898ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31302025-03-01T00:12:02.898ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31312025-03-01T00:12:02.898ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31322025-03-01T00:12:02.900ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
31332025-03-01T00:12:02.902ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
31342025-03-01T00:12:02.903ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 uri = /v1/system/ip-pools/default/silos
31352025-03-01T00:12:02.903ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database uri = /v1/system/ip-pools/default/silos
31362025-03-01T00:12:02.903ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
31372025-03-01T00:12:02.903ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
31382025-03-01T00:12:02.905ZTRACtest_instance_serial (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") } uri = /v1/system/ip-pools/default/silos
31392025-03-01T00:12:02.905ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
31402025-03-01T00:12:02.906ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database uri = /v1/system/ip-pools/default/silos
31412025-03-01T00:12:02.906ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
31422025-03-01T00:12:02.906ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
31432025-03-01T00:12:02.911ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
31442025-03-01T00:12:02.915ZDEBGtest_instance_serial (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = IpPool { parent: Fleet, key: cd7d9730-b2a9-4968-a82b-49f2bfd6b338, lookup_type: ByName("default") } result = Ok(()) uri = /v1/system/ip-pools/default/silos
31452025-03-01T00:12:02.917ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database uri = /v1/system/ip-pools/default/silos
31462025-03-01T00:12:02.917ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
31472025-03-01T00:12:02.917ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
31482025-03-01T00:12:02.919ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database uri = /v1/system/ip-pools/default/silos
31492025-03-01T00:12:02.919ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
31502025-03-01T00:12:02.920ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
31512025-03-01T00:12:02.923ZTRACtest_instance_serial (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/system/ip-pools/default/silos
31522025-03-01T00:12:02.924ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/system/ip-pools/default/silos
31532025-03-01T00:12:02.924ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database uri = /v1/system/ip-pools/default/silos
31542025-03-01T00:12:02.924ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
31552025-03-01T00:12:02.924ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
31562025-03-01T00:12:02.962ZDEBGtest_instance_serial (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:41715/metrics/producers
31572025-03-01T00:12:02.963ZINFOtest_instance_serial (dropshot_internal): accepted connection local_addr = 127.0.0.1:41715 remote_addr = 127.0.0.1:42658
31582025-03-01T00:12:02.965ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42658 req_id = b6271358-317b-45c0-bff1-b5575ddaff25 uri = /metrics/producers
31592025-03-01T00:12:02.965ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42658 req_id = b6271358-317b-45c0-bff1-b5575ddaff25 resource = Database uri = /metrics/producers
31602025-03-01T00:12:02.965ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42658 req_id = b6271358-317b-45c0-bff1-b5575ddaff25 roles = RoleSet { roles: {} } uri = /metrics/producers
31612025-03-01T00:12:02.966ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42658 req_id = b6271358-317b-45c0-bff1-b5575ddaff25 resource = Database result = Ok(()) uri = /metrics/producers
31622025-03-01T00:12:02.966ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
31632025-03-01T00:12:02.966ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database uri = /v1/system/ip-pools/default/silos
31642025-03-01T00:12:02.967ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
31652025-03-01T00:12:02.967ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
31662025-03-01T00:12:02.972ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
31672025-03-01T00:12:02.975ZDEBGtest_instance_serial (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/system/ip-pools/default/silos
31682025-03-01T00:12:02.975ZTRACtest_instance_serial (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = IpPoolList uri = /v1/system/ip-pools/default/silos
31692025-03-01T00:12:02.975ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/system/ip-pools/default/silos
31702025-03-01T00:12:02.975ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database uri = /v1/system/ip-pools/default/silos
31712025-03-01T00:12:02.975ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
31722025-03-01T00:12:02.975ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
31732025-03-01T00:12:02.978ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } uri = /v1/system/ip-pools/default/silos
31742025-03-01T00:12:02.982ZDEBGtest_instance_serial (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = IpPoolList result = Ok(()) uri = /v1/system/ip-pools/default/silos
31752025-03-01T00:12:02.982ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database uri = /v1/system/ip-pools/default/silos
31762025-03-01T00:12:02.983ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 roles = RoleSet { roles: {} } uri = /v1/system/ip-pools/default/silos
31772025-03-01T00:12:02.983ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 resource = Database result = Ok(()) uri = /v1/system/ip-pools/default/silos
31782025-03-01T00:12:02.983ZINFOtest_instance_serial (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
31792025-03-01T00:12:02.985ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 19933 local_addr = 127.0.0.1:41715 method = POST remote_addr = 127.0.0.1:42658 req_id = b6271358-317b-45c0-bff1-b5575ddaff25 response_code = 201 uri = /metrics/producers
31802025-03-01T00:12:02.985ZDEBGtest_instance_serial (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "b6271358-317b-45c0-bff1-b5575ddaff25", "content-length": "41", "date": "Sat, 01 Mar 2025 00:12:02 GMT"} })
31812025-03-01T00:12:02.985ZDEBGtest_instance_serial (producer-registration-task): registered with nexus successfully
31822025-03-01T00:12:02.985ZDEBGtest_instance_serial (producer-registration-task): pausing until time to renew lease lease_duration = 600s wait_period = 150s
31832025-03-01T00:12:03.061ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 185563 local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = f3b1314a-5bb1-4665-87c8-c19e0eccd1a9 response_code = 201 uri = /v1/system/ip-pools/default/silos
31842025-03-01T00:12:03.062ZINFOtest_instance_serial (external client test context): client received response status = 201
31852025-03-01T00:12:03.063ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:43509/v1/projects
31862025-03-01T00:12:03.063ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce uri = /v1/projects
31872025-03-01T00:12:03.063ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce uri = /v1/projects
31882025-03-01T00:12:03.063ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
31892025-03-01T00:12:03.063ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31902025-03-01T00:12:03.063ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31912025-03-01T00:12:03.064ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31922025-03-01T00:12:03.065ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31932025-03-01T00:12:03.065ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31942025-03-01T00:12:03.067ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
31952025-03-01T00:12:03.067ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
31962025-03-01T00:12:03.068ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
31972025-03-01T00:12:03.068ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
31982025-03-01T00:12:03.068ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
31992025-03-01T00:12:03.069ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
32002025-03-01T00:12:03.070ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32012025-03-01T00:12:03.070ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
32022025-03-01T00:12:03.070ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
32032025-03-01T00:12:03.071ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
32042025-03-01T00:12:03.072ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
32052025-03-01T00:12:03.075ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
32062025-03-01T00:12:03.075ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
32072025-03-01T00:12:03.075ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
32082025-03-01T00:12:03.076ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
32092025-03-01T00:12:03.078ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
32102025-03-01T00:12:03.078ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
32112025-03-01T00:12:03.078ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
32122025-03-01T00:12:03.078ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
32132025-03-01T00:12:03.078ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
32142025-03-01T00:12:03.083ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
32152025-03-01T00:12:03.084ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
32162025-03-01T00:12:03.084ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
32172025-03-01T00:12:03.084ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
32182025-03-01T00:12:03.086ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
32192025-03-01T00:12:03.089ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
32202025-03-01T00:12:03.090ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce uri = /v1/projects
32212025-03-01T00:12:03.091ZTRACtest_instance_serial (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } uri = /v1/projects
32222025-03-01T00:12:03.091ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/projects
32232025-03-01T00:12:03.091ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce resource = Database uri = /v1/projects
32242025-03-01T00:12:03.091ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce roles = RoleSet { roles: {} } uri = /v1/projects
32252025-03-01T00:12:03.091ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce resource = Database result = Ok(()) uri = /v1/projects
32262025-03-01T00:12:03.091ZTRACtest_instance_serial (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
32272025-03-01T00:12:03.093ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/projects
32282025-03-01T00:12:03.093ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce resource = Database uri = /v1/projects
32292025-03-01T00:12:03.093ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce roles = RoleSet { roles: {} } uri = /v1/projects
32302025-03-01T00:12:03.094ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce resource = Database result = Ok(()) uri = /v1/projects
32312025-03-01T00:12:03.097ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/projects
32322025-03-01T00:12:03.102ZDEBGtest_instance_serial (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) uri = /v1/projects
32332025-03-01T00:12:03.103ZINFOtest_instance_serial (SagaExecutor): preparing saga saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create
32342025-03-01T00:12:03.103ZINFOtest_instance_serial (SEC): saga create dag = {"end_node":19,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[2,3,null],[16,17,null],[18,0,null],[17,19,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"springfield-squidport"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":18} saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32352025-03-01T00:12:03.103ZINFOtest_instance_serial (SecStore): creating saga saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create
32362025-03-01T00:12:03.165ZINFOtest_instance_serial (SagaExecutor): starting saga saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create
32372025-03-01T00:12:03.165ZINFOtest_instance_serial (SEC): saga start saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32382025-03-01T00:12:03.166ZDEBGtest_instance_serial (SEC): saga log event new_state = N018 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32392025-03-01T00:12:03.166ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 18 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32402025-03-01T00:12:03.205ZDEBGtest_instance_serial (SEC): saga log event new_state = N018 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32412025-03-01T00:12:03.205ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32422025-03-01T00:12:03.212ZDEBGtest_instance_serial (SEC): saga log event new_state = N000 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32432025-03-01T00:12:03.212ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 0 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32442025-03-01T00:12:03.220ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32452025-03-01T00:12:03.221ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32462025-03-01T00:12:03.221ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32472025-03-01T00:12:03.221ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32482025-03-01T00:12:03.221ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32492025-03-01T00:12:03.225ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32502025-03-01T00:12:03.225ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32512025-03-01T00:12:03.225ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32522025-03-01T00:12:03.225ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32532025-03-01T00:12:03.229ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32542025-03-01T00:12:03.232ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32552025-03-01T00:12:03.232ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32562025-03-01T00:12:03.232ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32572025-03-01T00:12:03.233ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = ProjectCreateRecord
32582025-03-01T00:12:03.265ZDEBGtest_instance_serial (SEC): saga log event new_state = N000 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32592025-03-01T00:12:03.265ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "name": String("springfield-squidport"), "time_created": String("2025-03-01T00:12:03.219479Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.219479Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]) node_id = 0 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32602025-03-01T00:12:03.282ZDEBGtest_instance_serial (SEC): saga log event new_state = N001 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32612025-03-01T00:12:03.282ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 1 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32622025-03-01T00:12:03.292ZDEBGtest_instance_serial (SEC): saga log event new_state = N001 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32632025-03-01T00:12:03.292ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"authz_project": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fdaf:bb89:e881::/48"), "name": String("default")}}) node_id = 1 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32642025-03-01T00:12:03.298ZDEBGtest_instance_serial (SEC): saga log event new_state = N002 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32652025-03-01T00:12:03.298ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 2 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32662025-03-01T00:12:03.304ZDEBGtest_instance_serial (SEC): saga log event new_state = N002 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32672025-03-01T00:12:03.304ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32682025-03-01T00:12:03.310ZDEBGtest_instance_serial (SEC): saga log event new_state = N003 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32692025-03-01T00:12:03.312ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 3 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32702025-03-01T00:12:03.317ZDEBGtest_instance_serial (SEC): saga log event new_state = N003 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32712025-03-01T00:12:03.319ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("7b27527e-c873-4059-a48d-0d5039286f85")) node_id = 3 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32722025-03-01T00:12:03.323ZDEBGtest_instance_serial (SEC): saga log event new_state = N004 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32732025-03-01T00:12:03.323ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 4 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32742025-03-01T00:12:03.325ZTRACtest_instance_serial (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: ab 00 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:51836 req_id = 53bce115-e675-4737-94b4-10ef73441e60
32752025-03-01T00:12:03.326ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 43776,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:51836 req_id = 53bce115-e675-4737-94b4-10ef73441e60
32762025-03-01T00:12:03.327ZDEBGtest_instance_serial (store): query key key = _crucible-pantry._tcp
32772025-03-01T00:12:03.327ZDEBGtest_instance_serial (store): query key key = 758d4c62-f125-45a8-83d6-22953d8c0fe0.host
32782025-03-01T00:12:03.327ZDEBGtest_instance_serial (dns): dns response additional_records = [Record { name_labels: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal"), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] kind = dns peer_addr = [::1]:51836 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), rr_type: SRV, dns_class: IN, ttl: 0, rdata: Some(SRV(SRV { priority: 0, weight: 0, port: 34655, target: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal") })) }] req_id = 53bce115-e675-4737-94b4-10ef73441e60
32792025-03-01T00:12:03.327ZTRACtest_instance_serial (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: ec 5c 01 00 00 01 00 00 00 00 00 01 24 37 35 38 .\\..........$758\n0010: 64 34 63 36 32 2d 66 31 32 35 2d 34 35 61 38 2d d4c62-f125-45a8-\n0020: 38 33 64 36 2d 32 32 39 35 33 64 38 63 30 66 65 83d6-22953d8c0fe\n0030: 30 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 0.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:52087 req_id = 750cfb9d-7032-446e-90ee-012d644b707e
32802025-03-01T00:12:03.327ZDEBGtest_instance_serial (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 60508,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n query: WireQuery {\n query: LowerQuery {\n name: LowerName(\n Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n original: [\n 36,\n 55,\n 53,\n 56,\n 100,\n 52,\n 99,\n 54,\n 50,\n 45,\n 102,\n 49,\n 50,\n 53,\n 45,\n 52,\n 53,\n 97,\n 56,\n 45,\n 56,\n 51,\n 100,\n 54,\n 45,\n 50,\n 50,\n 57,\n 53,\n 51,\n 100,\n 56,\n 99,\n 48,\n 102,\n 101,\n 48,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n dnssec_ok: false,\n max_payload: 1232,\n options: OPT {\n options: {},\n },\n },\n ),\n} peer_addr = [::1]:52087 req_id = 750cfb9d-7032-446e-90ee-012d644b707e
32812025-03-01T00:12:03.328ZDEBGtest_instance_serial (store): query key key = 758d4c62-f125-45a8-83d6-22953d8c0fe0.host
32822025-03-01T00:12:03.328ZDEBGtest_instance_serial (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:52087 query = LowerQuery { name: LowerName(Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal.")), original: Query { name: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("758d4c62-f125-45a8-83d6-22953d8c0fe0.host.control-plane.oxide.internal."), rr_type: AAAA, dns_class: IN, ttl: 0, rdata: Some(AAAA(AAAA(::1))) }] req_id = 750cfb9d-7032-446e-90ee-012d644b707e
32832025-03-01T00:12:03.368ZDEBGtest_instance_serial (SEC): saga log event new_state = N004 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32842025-03-01T00:12:03.368ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("62f2baeb-6247-44a9-9a7e-7024222a2eee")) node_id = 4 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32852025-03-01T00:12:03.368ZINFOtest_instance_serial (dropshot): accepted connection kind = pantry local_addr = [::1]:34655 remote_addr = [::1]:37830 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32862025-03-01T00:12:03.369ZTRACtest_instance_serial (dropshot): incoming request kind = pantry local_addr = [::1]:34655 method = GET remote_addr = [::1]:37830 req_id = be8af59c-9a88-4d72-b806-6cc68206da18 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
32872025-03-01T00:12:03.369ZINFOtest_instance_serial (dropshot): request completed kind = pantry latency_us = 338 local_addr = [::1]:34655 method = GET remote_addr = [::1]:37830 req_id = be8af59c-9a88-4d72-b806-6cc68206da18 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
32882025-03-01T00:12:03.644ZDEBGtest_instance_serial (SEC): saga log event new_state = N005 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
32892025-03-01T00:12:03.645ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 5 saga_id = f8838032-0362-4833-90a9-a6213af87ece
32902025-03-01T00:12:03.645ZINFOtest_instance_serial (dropshot): accepted connection kind = pantry local_addr = [::1]:34655 remote_addr = [::1]:37832 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32912025-03-01T00:12:03.645ZINFOtest_instance_serial (dropshot): accepted connection kind = pantry local_addr = [::1]:34655 remote_addr = [::1]:37834 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32922025-03-01T00:12:03.645ZINFOtest_instance_serial (dropshot): accepted connection kind = pantry local_addr = [::1]:34655 remote_addr = [::1]:37836 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32932025-03-01T00:12:03.645ZINFOtest_instance_serial (dropshot): accepted connection kind = pantry local_addr = [::1]:34655 remote_addr = [::1]:37838 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32942025-03-01T00:12:03.646ZINFOtest_instance_serial (dropshot): accepted connection kind = pantry local_addr = [::1]:34655 remote_addr = [::1]:37840 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32952025-03-01T00:12:03.646ZINFOtest_instance_serial (dropshot): accepted connection kind = pantry local_addr = [::1]:34655 remote_addr = [::1]:37844 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32962025-03-01T00:12:03.646ZINFOtest_instance_serial (dropshot): accepted connection kind = pantry local_addr = [::1]:34655 remote_addr = [::1]:37848 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
32972025-03-01T00:12:03.647ZTRACtest_instance_serial (dropshot): incoming request kind = pantry local_addr = [::1]:34655 method = GET remote_addr = [::1]:37832 req_id = fa250be3-6a0e-4bbb-8bfc-abffc244e2a5 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
32982025-03-01T00:12:03.648ZTRACtest_instance_serial (dropshot): incoming request kind = pantry local_addr = [::1]:34655 method = GET remote_addr = [::1]:37834 req_id = f7259905-f9ea-4f46-b28c-ce1ea8ada6ea sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
32992025-03-01T00:12:03.648ZTRACtest_instance_serial (dropshot): incoming request kind = pantry local_addr = [::1]:34655 method = GET remote_addr = [::1]:37836 req_id = 2778c549-27c0-4d03-a2ac-0acf8d80b518 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33002025-03-01T00:12:03.648ZTRACtest_instance_serial (dropshot): incoming request kind = pantry local_addr = [::1]:34655 method = GET remote_addr = [::1]:37838 req_id = fc536370-d21f-41c4-9825-24b052268717 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33012025-03-01T00:12:03.648ZTRACtest_instance_serial (dropshot): incoming request kind = pantry local_addr = [::1]:34655 method = GET remote_addr = [::1]:37840 req_id = e229cbec-b513-4d49-8f87-0211e6f9dc7e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33022025-03-01T00:12:03.648ZTRACtest_instance_serial (dropshot): incoming request kind = pantry local_addr = [::1]:34655 method = GET remote_addr = [::1]:37844 req_id = 7df3c714-0fcc-4a32-b407-4ed2ba509500 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33032025-03-01T00:12:03.648ZTRACtest_instance_serial (dropshot): incoming request kind = pantry local_addr = [::1]:34655 method = GET remote_addr = [::1]:37848 req_id = c331027a-5930-49e6-8878-a15424beac2f sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33042025-03-01T00:12:03.649ZINFOtest_instance_serial (dropshot): request completed kind = pantry latency_us = 936 local_addr = [::1]:34655 method = GET remote_addr = [::1]:37832 req_id = fa250be3-6a0e-4bbb-8bfc-abffc244e2a5 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33052025-03-01T00:12:03.649ZINFOtest_instance_serial (dropshot): request completed kind = pantry latency_us = 767 local_addr = [::1]:34655 method = GET remote_addr = [::1]:37834 req_id = f7259905-f9ea-4f46-b28c-ce1ea8ada6ea response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33062025-03-01T00:12:03.649ZINFOtest_instance_serial (dropshot): request completed kind = pantry latency_us = 719 local_addr = [::1]:34655 method = GET remote_addr = [::1]:37836 req_id = 2778c549-27c0-4d03-a2ac-0acf8d80b518 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33072025-03-01T00:12:03.649ZINFOtest_instance_serial (dropshot): request completed kind = pantry latency_us = 662 local_addr = [::1]:34655 method = GET remote_addr = [::1]:37838 req_id = fc536370-d21f-41c4-9825-24b052268717 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33082025-03-01T00:12:03.649ZINFOtest_instance_serial (dropshot): request completed kind = pantry latency_us = 1501 local_addr = [::1]:34655 method = GET remote_addr = [::1]:37840 req_id = e229cbec-b513-4d49-8f87-0211e6f9dc7e response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33092025-03-01T00:12:03.651ZINFOtest_instance_serial (dropshot): request completed kind = pantry latency_us = 1600 local_addr = [::1]:34655 method = GET remote_addr = [::1]:37844 req_id = 7df3c714-0fcc-4a32-b407-4ed2ba509500 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33102025-03-01T00:12:03.651ZINFOtest_instance_serial (dropshot): request completed kind = pantry latency_us = 1552 local_addr = [::1]:34655 method = GET remote_addr = [::1]:37848 req_id = c331027a-5930-49e6-8878-a15424beac2f response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
33112025-03-01T00:12:03.653ZDEBGtest_instance_serial (SEC): saga log event new_state = N005 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33122025-03-01T00:12:03.653ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("34c74f71-dd92-4bcd-a346-3ee23370ae3c")) node_id = 5 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33132025-03-01T00:12:03.659ZDEBGtest_instance_serial (SEC): saga log event new_state = N006 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33142025-03-01T00:12:03.660ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 6 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33152025-03-01T00:12:03.666ZDEBGtest_instance_serial (SEC): saga log event new_state = N006 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33162025-03-01T00:12:03.667ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("75e86919-d5cf-408c-9d8e-1ac2759615b1")) node_id = 6 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33172025-03-01T00:12:03.672ZDEBGtest_instance_serial (SEC): saga log event new_state = N007 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33182025-03-01T00:12:03.673ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 7 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33192025-03-01T00:12:03.678ZDEBGtest_instance_serial (SEC): saga log event new_state = N007 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33202025-03-01T00:12:03.679ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("26dd1eee-2faf-4c35-b70b-9324674f17ef")) node_id = 7 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33212025-03-01T00:12:03.696ZDEBGtest_instance_serial (SEC): saga log event new_state = N008 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33222025-03-01T00:12:03.696ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 8 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33232025-03-01T00:12:03.702ZDEBGtest_instance_serial (SEC): saga log event new_state = N008 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33242025-03-01T00:12:03.704ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("0a0c9f59-6a31-43b0-969f-131b36ea3043")) node_id = 8 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33252025-03-01T00:12:03.709ZDEBGtest_instance_serial (SEC): saga log event new_state = N009 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33262025-03-01T00:12:03.709ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 9 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33272025-03-01T00:12:03.715ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33282025-03-01T00:12:03.715ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33292025-03-01T00:12:03.716ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33302025-03-01T00:12:03.717ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33312025-03-01T00:12:03.722ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33322025-03-01T00:12:03.724ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
33332025-03-01T00:12:03.724ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
33342025-03-01T00:12:03.731ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
33352025-03-01T00:12:03.732ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
33362025-03-01T00:12:03.734ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
33372025-03-01T00:12:03.734ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
33382025-03-01T00:12:03.735ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33392025-03-01T00:12:03.737ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33402025-03-01T00:12:03.737ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33412025-03-01T00:12:03.737ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33422025-03-01T00:12:03.747ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33432025-03-01T00:12:03.750ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33442025-03-01T00:12:03.750ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33452025-03-01T00:12:03.750ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33462025-03-01T00:12:03.755ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33472025-03-01T00:12:03.761ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33482025-03-01T00:12:03.763ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33492025-03-01T00:12:03.763ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33502025-03-01T00:12:03.763ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateVpc
33512025-03-01T00:12:03.781ZDEBGtest_instance_serial (SEC): saga log event new_state = N009 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33522025-03-01T00:12:03.781ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("7b27527e-c873-4059-a48d-0d5039286f85"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.715196Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.715196Z")}, "ipv6_prefix": String("fdaf:bb89:e881::/48"), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "subnet_gen": Number(1), "system_router_id": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "vni": Number(10277605)}]) node_id = 9 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33532025-03-01T00:12:03.801ZDEBGtest_instance_serial (SEC): saga log event new_state = N010 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33542025-03-01T00:12:03.802ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 10 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33552025-03-01T00:12:03.807ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33562025-03-01T00:12:03.808ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33572025-03-01T00:12:03.808ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33582025-03-01T00:12:03.808ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33592025-03-01T00:12:03.808ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33602025-03-01T00:12:03.812ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33612025-03-01T00:12:03.812ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33622025-03-01T00:12:03.812ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33632025-03-01T00:12:03.813ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33642025-03-01T00:12:03.816ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33652025-03-01T00:12:03.816ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33662025-03-01T00:12:03.817ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33672025-03-01T00:12:03.817ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33682025-03-01T00:12:03.822ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33692025-03-01T00:12:03.836ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33702025-03-01T00:12:03.837ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33712025-03-01T00:12:03.837ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33722025-03-01T00:12:03.837ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateRouter
33732025-03-01T00:12:03.851ZDEBGtest_instance_serial (SEC): saga log event new_state = N010 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33742025-03-01T00:12:03.851ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"key": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "lookup_type": Object {"ById": String("62f2baeb-6247-44a9-9a7e-7024222a2eee")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 10 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33752025-03-01T00:12:03.857ZDEBGtest_instance_serial (SEC): saga log event new_state = N011 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33762025-03-01T00:12:03.858ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 11 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33772025-03-01T00:12:03.863ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33782025-03-01T00:12:03.863ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33792025-03-01T00:12:03.864ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33802025-03-01T00:12:03.864ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33812025-03-01T00:12:03.864ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33822025-03-01T00:12:03.871ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33832025-03-01T00:12:03.871ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33842025-03-01T00:12:03.871ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33852025-03-01T00:12:03.872ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33862025-03-01T00:12:03.876ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33872025-03-01T00:12:03.876ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33882025-03-01T00:12:03.876ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33892025-03-01T00:12:03.876ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33902025-03-01T00:12:03.878ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33912025-03-01T00:12:03.889ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33922025-03-01T00:12:03.889ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33932025-03-01T00:12:03.889ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33942025-03-01T00:12:03.889ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV4Route
33952025-03-01T00:12:03.905ZDEBGtest_instance_serial (SEC): saga log event new_state = N011 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33962025-03-01T00:12:03.905ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 11 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33972025-03-01T00:12:03.912ZDEBGtest_instance_serial (SEC): saga log event new_state = N012 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
33982025-03-01T00:12:03.912ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 12 saga_id = f8838032-0362-4833-90a9-a6213af87ece
33992025-03-01T00:12:03.919ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34002025-03-01T00:12:03.920ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34012025-03-01T00:12:03.921ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34022025-03-01T00:12:03.921ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34032025-03-01T00:12:03.921ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34042025-03-01T00:12:03.925ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34052025-03-01T00:12:03.925ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34062025-03-01T00:12:03.925ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34072025-03-01T00:12:03.932ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34082025-03-01T00:12:03.941ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34092025-03-01T00:12:03.941ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34102025-03-01T00:12:03.941ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34112025-03-01T00:12:03.942ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34122025-03-01T00:12:03.948ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34132025-03-01T00:12:03.959ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34142025-03-01T00:12:03.959ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34152025-03-01T00:12:03.959ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34162025-03-01T00:12:03.960ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateV6Route
34172025-03-01T00:12:03.975ZDEBGtest_instance_serial (SEC): saga log event new_state = N012 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
34182025-03-01T00:12:03.975ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = f8838032-0362-4833-90a9-a6213af87ece
34192025-03-01T00:12:03.984ZDEBGtest_instance_serial (SEC): saga log event new_state = N013 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
34202025-03-01T00:12:03.985ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 13 saga_id = f8838032-0362-4833-90a9-a6213af87ece
34212025-03-01T00:12:03.991ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34222025-03-01T00:12:03.992ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34232025-03-01T00:12:03.992ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34242025-03-01T00:12:03.992ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34252025-03-01T00:12:03.992ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34262025-03-01T00:12:03.995ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34272025-03-01T00:12:03.995ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34282025-03-01T00:12:03.995ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34292025-03-01T00:12:03.996ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34302025-03-01T00:12:03.999ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34312025-03-01T00:12:03.999ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34322025-03-01T00:12:03.999ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34332025-03-01T00:12:04.001ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34342025-03-01T00:12:04.005ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34352025-03-01T00:12:04.014ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34362025-03-01T00:12:04.021ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34372025-03-01T00:12:04.021ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34382025-03-01T00:12:04.022ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34392025-03-01T00:12:04.062ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34402025-03-01T00:12:04.063ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34412025-03-01T00:12:04.063ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateSubnet
34422025-03-01T00:12:04.074ZDEBGtest_instance_serial (SEC): saga log event new_state = N013 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
34432025-03-01T00:12:04.074ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "lookup_type": Object {"ById": String("26dd1eee-2faf-4c35-b70b-9324674f17ef")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.991080Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.991080Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fdaf:bb89:e881::/64"), "rcgen": Number(1), "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}]) node_id = 13 saga_id = f8838032-0362-4833-90a9-a6213af87ece
34442025-03-01T00:12:04.082ZDEBGtest_instance_serial (SEC): saga log event new_state = N014 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
34452025-03-01T00:12:04.082ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 14 saga_id = f8838032-0362-4833-90a9-a6213af87ece
34462025-03-01T00:12:04.088ZDEBGtest_instance_serial (nexus): default firewall rules for vpc default rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 84bd3491-3272-4ea1-a5c0-328d8069357c, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2025-03-01T00:12:04.088654197Z, time_modified: 2025-03-01T00:12:04.088654197Z, time_deleted: None }, vpc_id: 7b27527e-c873-4059-a48d-0d5039286f85, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: a0e49892-101c-48f9-8485-61213a77dcfd, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2025-03-01T00:12:04.088674058Z, time_modified: 2025-03-01T00:12:04.088674058Z, time_deleted: None }, vpc_id: 7b27527e-c873-4059-a48d-0d5039286f85, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: fbd5ee63-984e-4a44-9c54-a654943e0fb4, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2025-03-01T00:12:04.088686378Z, time_modified: 2025-03-01T00:12:04.088686378Z, time_deleted: None }, vpc_id: 7b27527e-c873-4059-a48d-0d5039286f85, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
34472025-03-01T00:12:04.088ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34482025-03-01T00:12:04.090ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34492025-03-01T00:12:04.090ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34502025-03-01T00:12:04.090ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34512025-03-01T00:12:04.090ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34522025-03-01T00:12:04.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
34532025-03-01T00:12:04.090ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
34542025-03-01T00:12:04.090ZDEBGtest_instance_serial (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
34552025-03-01T00:12:04.090ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
34562025-03-01T00:12:04.093ZTRACtest_instance_serial (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
34572025-03-01T00:12:04.093ZDEBGtest_instance_serial (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c schema = TimeseriesSchema { timeseries_name: TimeseriesName("integration_target:integration_metric"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "metric_name", field_type: String, source: Metric, description: "" }, FieldSchema { name: "target_name", field_type: String, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:04.090704411Z } timeseries_name = integration_target:integration_metric
34582025-03-01T00:12:04.093ZDEBGtest_instance_serial (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
34592025-03-01T00:12:04.093ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 6 n_rows = 1 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
34602025-03-01T00:12:04.094ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34612025-03-01T00:12:04.094ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34622025-03-01T00:12:04.094ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34632025-03-01T00:12:04.095ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34642025-03-01T00:12:04.099ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34652025-03-01T00:12:04.099ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34662025-03-01T00:12:04.099ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34672025-03-01T00:12:04.099ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34682025-03-01T00:12:04.103ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
34692025-03-01T00:12:04.105ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34702025-03-01T00:12:04.114ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34712025-03-01T00:12:04.115ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34722025-03-01T00:12:04.115ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34732025-03-01T00:12:04.116ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcUpdateFirewall
34742025-03-01T00:12:04.118ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
34752025-03-01T00:12:04.120ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
34762025-03-01T00:12:04.124ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
34772025-03-01T00:12:04.124ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
34782025-03-01T00:12:04.254ZDEBGtest_instance_serial (SEC): saga log event new_state = N014 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
34792025-03-01T00:12:04.254ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("84bd3491-3272-4ea1-a5c0-328d8069357c"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-01T00:12:04.088654197Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088654197Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("a0e49892-101c-48f9-8485-61213a77dcfd"), "name": String("allow-ssh"), "time_created": String("2025-03-01T00:12:04.088674058Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088674058Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("fbd5ee63-984e-4a44-9c54-a654943e0fb4"), "name": String("allow-icmp"), "time_created": String("2025-03-01T00:12:04.088686378Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088686378Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}]) node_id = 14 saga_id = f8838032-0362-4833-90a9-a6213af87ece
34802025-03-01T00:12:04.262ZDEBGtest_instance_serial (SEC): saga log event new_state = N015 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
34812025-03-01T00:12:04.263ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 15 saga_id = f8838032-0362-4833-90a9-a6213af87ece
34822025-03-01T00:12:04.275ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34832025-03-01T00:12:04.275ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34842025-03-01T00:12:04.275ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34852025-03-01T00:12:04.276ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34862025-03-01T00:12:04.277ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34872025-03-01T00:12:04.280ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34882025-03-01T00:12:04.282ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34892025-03-01T00:12:04.282ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34902025-03-01T00:12:04.282ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34912025-03-01T00:12:04.284ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34922025-03-01T00:12:04.284ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34932025-03-01T00:12:04.285ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34942025-03-01T00:12:04.285ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34952025-03-01T00:12:04.292ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34962025-03-01T00:12:04.295ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34972025-03-01T00:12:04.295ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34982025-03-01T00:12:04.296ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
34992025-03-01T00:12:04.296ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35002025-03-01T00:12:04.307ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35012025-03-01T00:12:04.313ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35022025-03-01T00:12:04.313ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35032025-03-01T00:12:04.322ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35042025-03-01T00:12:04.322ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35052025-03-01T00:12:04.322ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35062025-03-01T00:12:04.328ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 0a0c9f59-6a31-43b0-969f-131b36ea3043, lookup_type: ById(0a0c9f59-6a31-43b0-969f-131b36ea3043) } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35072025-03-01T00:12:04.329ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35082025-03-01T00:12:04.329ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35092025-03-01T00:12:04.330ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35102025-03-01T00:12:04.330ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35112025-03-01T00:12:04.332ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35122025-03-01T00:12:04.332ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35132025-03-01T00:12:04.332ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35142025-03-01T00:12:04.333ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35152025-03-01T00:12:04.335ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35162025-03-01T00:12:04.336ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35172025-03-01T00:12:04.336ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35182025-03-01T00:12:04.337ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35192025-03-01T00:12:04.339ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35202025-03-01T00:12:04.359ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 0a0c9f59-6a31-43b0-969f-131b36ea3043, lookup_type: ById(0a0c9f59-6a31-43b0-969f-131b36ea3043) } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35212025-03-01T00:12:04.360ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35222025-03-01T00:12:04.360ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35232025-03-01T00:12:04.360ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcCreateGateway
35242025-03-01T00:12:04.379ZDEBGtest_instance_serial (SEC): saga log event new_state = N015 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35252025-03-01T00:12:04.379ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"key": String("0a0c9f59-6a31-43b0-969f-131b36ea3043"), "lookup_type": Object {"ById": String("0a0c9f59-6a31-43b0-969f-131b36ea3043")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 15 saga_id = f8838032-0362-4833-90a9-a6213af87ece
35262025-03-01T00:12:04.386ZDEBGtest_instance_serial (SEC): saga log event new_state = N016 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35272025-03-01T00:12:04.386ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 16 saga_id = f8838032-0362-4833-90a9-a6213af87ece
35282025-03-01T00:12:04.402ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35292025-03-01T00:12:04.402ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35302025-03-01T00:12:04.402ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35312025-03-01T00:12:04.404ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35322025-03-01T00:12:04.405ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35332025-03-01T00:12:04.406ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35342025-03-01T00:12:04.407ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35352025-03-01T00:12:04.408ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35362025-03-01T00:12:04.408ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35372025-03-01T00:12:04.409ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35382025-03-01T00:12:04.410ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35392025-03-01T00:12:04.410ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35402025-03-01T00:12:04.410ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35412025-03-01T00:12:04.410ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35422025-03-01T00:12:04.412ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35432025-03-01T00:12:04.413ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35442025-03-01T00:12:04.413ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35452025-03-01T00:12:04.413ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35462025-03-01T00:12:04.417ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35472025-03-01T00:12:04.419ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35482025-03-01T00:12:04.419ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35492025-03-01T00:12:04.419ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35502025-03-01T00:12:04.420ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35512025-03-01T00:12:04.428ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35522025-03-01T00:12:04.430ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35532025-03-01T00:12:04.430ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35542025-03-01T00:12:04.430ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35552025-03-01T00:12:04.430ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35562025-03-01T00:12:04.430ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35572025-03-01T00:12:04.436ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35582025-03-01T00:12:04.437ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35592025-03-01T00:12:04.437ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35602025-03-01T00:12:04.437ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35612025-03-01T00:12:04.440ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35622025-03-01T00:12:04.440ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35632025-03-01T00:12:04.440ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35642025-03-01T00:12:04.441ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35652025-03-01T00:12:04.444ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35662025-03-01T00:12:04.455ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35672025-03-01T00:12:04.455ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35682025-03-01T00:12:04.455ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35692025-03-01T00:12:04.456ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_node = VpcNotifySleds
35702025-03-01T00:12:04.464ZDEBGtest_instance_serial (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
35712025-03-01T00:12:04.464ZDEBGtest_instance_serial (nexus): resolved firewall rules for sled agents sled_agent_rules = []
35722025-03-01T00:12:04.464ZDEBGtest_instance_serial (nexus): resolved 0 rules for sleds
35732025-03-01T00:12:04.499ZDEBGtest_instance_serial (nexus): resolved sleds for vpc default vpc_to_sled = []
35742025-03-01T00:12:04.499ZDEBGtest_instance_serial (nexus): sending firewall rules to sled agents
35752025-03-01T00:12:04.499ZINFOtest_instance_serial (nexus): updated firewall rules on 0 sleds
35762025-03-01T00:12:04.504ZDEBGtest_instance_serial (SEC): saga log event new_state = N016 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35772025-03-01T00:12:04.505ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = f8838032-0362-4833-90a9-a6213af87ece
35782025-03-01T00:12:04.511ZDEBGtest_instance_serial (SEC): saga log event new_state = N017 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35792025-03-01T00:12:04.512ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 17 saga_id = f8838032-0362-4833-90a9-a6213af87ece
35802025-03-01T00:12:04.517ZDEBGtest_instance_serial (SEC): saga log event new_state = N017 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35812025-03-01T00:12:04.518ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 17 saga_id = f8838032-0362-4833-90a9-a6213af87ece
35822025-03-01T00:12:04.523ZDEBGtest_instance_serial (SEC): saga log event new_state = N019 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35832025-03-01T00:12:04.523ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 19 saga_id = f8838032-0362-4833-90a9-a6213af87ece
35842025-03-01T00:12:04.530ZDEBGtest_instance_serial (SEC): saga log event new_state = N019 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35852025-03-01T00:12:04.530ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 19 saga_id = f8838032-0362-4833-90a9-a6213af87ece
35862025-03-01T00:12:04.536ZINFOtest_instance_serial (SEC): update for saga cached state new_state = Done saga_id = f8838032-0362-4833-90a9-a6213af87ece sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35872025-03-01T00:12:04.536ZINFOtest_instance_serial (SecStore): updating state new_state = done saga_id = f8838032-0362-4833-90a9-a6213af87ece
35882025-03-01T00:12:04.556ZINFOtest_instance_serial (SEC): saga finished result = success saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
35892025-03-01T00:12:04.557ZINFOtest_instance_serial (SagaExecutor): saga finished saga_id = f8838032-0362-4833-90a9-a6213af87ece saga_name = project-create saga_result = SagaResult { saga_id: f8838032-0362-4833-90a9-a6213af87ece, saga_log: SagaLog { saga_id: f8838032-0362-4833-90a9-a6213af87ece, unwinding: false, events: [N018 started, N018 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N019 started, N019 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "name": String("springfield-squidport"), "time_created": String("2025-03-01T00:12:03.219479Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.219479Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fdaf:bb89:e881::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("7b27527e-c873-4059-a48d-0d5039286f85")), 4: Succeeded(String("62f2baeb-6247-44a9-9a7e-7024222a2eee")), 5: Succeeded(String("34c74f71-dd92-4bcd-a346-3ee23370ae3c")), 6: Succeeded(String("75e86919-d5cf-408c-9d8e-1ac2759615b1")), 7: Succeeded(String("26dd1eee-2faf-4c35-b70b-9324674f17ef")), 8: Succeeded(String("0a0c9f59-6a31-43b0-969f-131b36ea3043")), 9: Succeeded(Array [Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("7b27527e-c873-4059-a48d-0d5039286f85"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.715196Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.715196Z")}, "ipv6_prefix": String("fdaf:bb89:e881::/48"), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "subnet_gen": Number(1), "system_router_id": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "vni": Number(10277605)}]), 10: Succeeded(Object {"key": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "lookup_type": Object {"ById": String("62f2baeb-6247-44a9-9a7e-7024222a2eee")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 11: Succeeded(Null), 12: Succeeded(Null), 13: Succeeded(Array [Object {"key": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "lookup_type": Object {"ById": String("26dd1eee-2faf-4c35-b70b-9324674f17ef")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.991080Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.991080Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fdaf:bb89:e881::/64"), "rcgen": Number(1), "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}]), 14: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("84bd3491-3272-4ea1-a5c0-328d8069357c"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-01T00:12:04.088654197Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088654197Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("a0e49892-101c-48f9-8485-61213a77dcfd"), "name": String("allow-ssh"), "time_created": String("2025-03-01T00:12:04.088674058Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088674058Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("fbd5ee63-984e-4a44-9c54-a654943e0fb4"), "name": String("allow-icmp"), "time_created": String("2025-03-01T00:12:04.088686378Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088686378Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}]), 15: Succeeded(Object {"key": String("0a0c9f59-6a31-43b0-969f-131b36ea3043"), "lookup_type": Object {"ById": String("0a0c9f59-6a31-43b0-969f-131b36ea3043")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("0a0c9f59-6a31-43b0-969f-131b36ea3043"), "default_subnet_id": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "default_v4_route_id": String("34c74f71-dd92-4bcd-a346-3ee23370ae3c"), "default_v6_route_id": String("75e86919-d5cf-408c-9d8e-1ac2759615b1"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("84bd3491-3272-4ea1-a5c0-328d8069357c"), "name": String("allow-internal-inbound"), "time_created": String("2025-03-01T00:12:04.088654197Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088654197Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [String("TCP")], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("a0e49892-101c-48f9-8485-61213a77dcfd"), "name": String("allow-ssh"), "time_created": String("2025-03-01T00:12:04.088674058Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088674058Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [String("ICMP")], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("fbd5ee63-984e-4a44-9c54-a654943e0fb4"), "name": String("allow-icmp"), "time_created": String("2025-03-01T00:12:04.088686378Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.088686378Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}], "gateway": Object {"key": String("0a0c9f59-6a31-43b0-969f-131b36ea3043"), "lookup_type": Object {"ById": String("0a0c9f59-6a31-43b0-969f-131b36ea3043")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "name": String("springfield-squidport"), "time_created": String("2025-03-01T00:12:03.219479Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.219479Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route4": Null, "route6": Null, "router": Object {"key": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "lookup_type": Object {"ById": String("62f2baeb-6247-44a9-9a7e-7024222a2eee")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "lookup_type": Object {"ById": String("26dd1eee-2faf-4c35-b70b-9324674f17ef")}, "parent": Object {"key": String("7b27527e-c873-4059-a48d-0d5039286f85"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("26dd1eee-2faf-4c35-b70b-9324674f17ef"), "name": String("default"), "time_created": String("2025-03-01T00:12:03.991080Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:03.991080Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fdaf:bb89:e881::/64"), "rcgen": Number(1), "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")}], "system_router_id": String("62f2baeb-6247-44a9-9a7e-7024222a2eee"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fdaf:bb89:e881::/48"), "name": String("default")}}, "vpc_id": String("7b27527e-c873-4059-a48d-0d5039286f85")} }) }
35902025-03-01T00:12:04.558ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 1494907 local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = d5ec5aaa-7944-4db6-a064-946e402ee4ce response_code = 201 uri = /v1/projects
35912025-03-01T00:12:04.558ZINFOtest_instance_serial (external client test context): client received response status = 201
35922025-03-01T00:12:04.558ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:43509/v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
35932025-03-01T00:12:04.559ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
35942025-03-01T00:12:04.559ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
35952025-03-01T00:12:04.559ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
35962025-03-01T00:12:04.559ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
35972025-03-01T00:12:04.559ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
35982025-03-01T00:12:04.559ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
35992025-03-01T00:12:04.561ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36002025-03-01T00:12:04.561ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36012025-03-01T00:12:04.562ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36022025-03-01T00:12:04.563ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
36032025-03-01T00:12:04.564ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
36042025-03-01T00:12:04.564ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36052025-03-01T00:12:04.564ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36062025-03-01T00:12:04.564ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36072025-03-01T00:12:04.567ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36082025-03-01T00:12:04.567ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36092025-03-01T00:12:04.567ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36102025-03-01T00:12:04.568ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36112025-03-01T00:12:04.570ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
36122025-03-01T00:12:04.573ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
36132025-03-01T00:12:04.573ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36142025-03-01T00:12:04.573ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36152025-03-01T00:12:04.573ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36162025-03-01T00:12:04.578ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
36172025-03-01T00:12:04.579ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
36182025-03-01T00:12:04.579ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36192025-03-01T00:12:04.579ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36202025-03-01T00:12:04.579ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36212025-03-01T00:12:04.582ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36222025-03-01T00:12:04.582ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36232025-03-01T00:12:04.582ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36242025-03-01T00:12:04.583ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36252025-03-01T00:12:04.585ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
36262025-03-01T00:12:04.589ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
36272025-03-01T00:12:04.589ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36282025-03-01T00:12:04.590ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36292025-03-01T00:12:04.591ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36302025-03-01T00:12:04.591ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36312025-03-01T00:12:04.592ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36322025-03-01T00:12:04.592ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36332025-03-01T00:12:04.593ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36342025-03-01T00:12:04.596ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36352025-03-01T00:12:04.596ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36362025-03-01T00:12:04.597ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36372025-03-01T00:12:04.600ZINFOtest_instance_serial (dropshot_external): request completed error_message_external = not found: instance with name "kris-picks" error_message_internal = not found: instance with name "kris-picks" latency_us = 41616 local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = c3f580ac-0219-429b-b1eb-07c63dc8c7eb response_code = 404 uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
36382025-03-01T00:12:04.602ZINFOtest_instance_serial (external client test context): client received response status = 404
36392025-03-01T00:12:04.602ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:43509/v1/instances?project=springfield-squidport
36402025-03-01T00:12:04.602ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa uri = /v1/instances?project=springfield-squidport
36412025-03-01T00:12:04.602ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa uri = /v1/instances?project=springfield-squidport
36422025-03-01T00:12:04.602ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances?project=springfield-squidport
36432025-03-01T00:12:04.602ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36442025-03-01T00:12:04.602ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36452025-03-01T00:12:04.603ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36462025-03-01T00:12:04.605ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36472025-03-01T00:12:04.605ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36482025-03-01T00:12:04.605ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36492025-03-01T00:12:04.615ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
36502025-03-01T00:12:04.615ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
36512025-03-01T00:12:04.615ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36522025-03-01T00:12:04.615ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36532025-03-01T00:12:04.616ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36542025-03-01T00:12:04.618ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36552025-03-01T00:12:04.618ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36562025-03-01T00:12:04.618ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36572025-03-01T00:12:04.618ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36582025-03-01T00:12:04.621ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
36592025-03-01T00:12:04.624ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
36602025-03-01T00:12:04.624ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36612025-03-01T00:12:04.624ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36622025-03-01T00:12:04.624ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36632025-03-01T00:12:04.627ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
36642025-03-01T00:12:04.627ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
36652025-03-01T00:12:04.627ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36662025-03-01T00:12:04.627ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36672025-03-01T00:12:04.628ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36682025-03-01T00:12:04.629ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
36692025-03-01T00:12:04.630ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
36702025-03-01T00:12:04.630ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
36712025-03-01T00:12:04.630ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
36722025-03-01T00:12:04.632ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
36732025-03-01T00:12:04.635ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
36742025-03-01T00:12:04.635ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa uri = /v1/instances?project=springfield-squidport
36752025-03-01T00:12:04.635ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
36762025-03-01T00:12:04.635ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
36772025-03-01T00:12:04.636ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
36782025-03-01T00:12:04.638ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
36792025-03-01T00:12:04.638ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
36802025-03-01T00:12:04.639ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
36812025-03-01T00:12:04.640ZTRACtest_instance_serial (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") } uri = /v1/instances?project=springfield-squidport
36822025-03-01T00:12:04.641ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances?project=springfield-squidport
36832025-03-01T00:12:04.641ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
36842025-03-01T00:12:04.642ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
36852025-03-01T00:12:04.642ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
36862025-03-01T00:12:04.643ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=springfield-squidport
36872025-03-01T00:12:04.644ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
36882025-03-01T00:12:04.644ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
36892025-03-01T00:12:04.644ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
36902025-03-01T00:12:04.645ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
36912025-03-01T00:12:04.645ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
36922025-03-01T00:12:04.647ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
36932025-03-01T00:12:04.647ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
36942025-03-01T00:12:04.647ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
36952025-03-01T00:12:04.647ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
36962025-03-01T00:12:04.648ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=springfield-squidport
36972025-03-01T00:12:04.648ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
36982025-03-01T00:12:04.648ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
36992025-03-01T00:12:04.649ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
37002025-03-01T00:12:04.650ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 4053 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
37012025-03-01T00:12:04.651ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "d1fdf65c-3a44-4ae0-9cfe-ffa773b44ba6", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:04 GMT"} })
37022025-03-01T00:12:04.651ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
37032025-03-01T00:12:04.651ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
37042025-03-01T00:12:04.651ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
37052025-03-01T00:12:04.652ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
37062025-03-01T00:12:04.652ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
37072025-03-01T00:12:04.653ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=springfield-squidport
37082025-03-01T00:12:04.660ZDEBGtest_instance_serial (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") } result = Ok(()) uri = /v1/instances?project=springfield-squidport
37092025-03-01T00:12:04.660ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
37102025-03-01T00:12:04.660ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
37112025-03-01T00:12:04.660ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
37122025-03-01T00:12:04.662ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 10739 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e0980b31-4fe4-4f92-b6da-e5aadae862a3 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
37132025-03-01T00:12:04.666ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
37142025-03-01T00:12:04.666ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
37152025-03-01T00:12:04.666ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
37162025-03-01T00:12:04.666ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e0980b31-4fe4-4f92-b6da-e5aadae862a3", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:04 GMT"} })
37172025-03-01T00:12:04.666ZDEBGtest_instance_serial (oximeter-agent): registered new metric producer address = 127.0.0.1:43677 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37182025-03-01T00:12:04.700ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37192025-03-01T00:12:04.701ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37202025-03-01T00:12:04.701ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
37212025-03-01T00:12:04.701ZTRACtest_instance_serial (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=springfield-squidport
37222025-03-01T00:12:04.703ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=springfield-squidport
37232025-03-01T00:12:04.703ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
37242025-03-01T00:12:04.705ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
37252025-03-01T00:12:04.705ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
37262025-03-01T00:12:04.705ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=springfield-squidport
37272025-03-01T00:12:04.705ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
37282025-03-01T00:12:04.705ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
37292025-03-01T00:12:04.705ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
37302025-03-01T00:12:04.708ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=springfield-squidport
37312025-03-01T00:12:04.710ZDEBGtest_instance_serial (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=springfield-squidport
37322025-03-01T00:12:04.710ZTRACtest_instance_serial (dropshot_external): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } uri = /v1/instances?project=springfield-squidport
37332025-03-01T00:12:04.710ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=springfield-squidport
37342025-03-01T00:12:04.710ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
37352025-03-01T00:12:04.710ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
37362025-03-01T00:12:04.710ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
37372025-03-01T00:12:04.715ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=springfield-squidport
37382025-03-01T00:12:04.716ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
37392025-03-01T00:12:04.716ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
37402025-03-01T00:12:04.716ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
37412025-03-01T00:12:04.722ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=springfield-squidport
37422025-03-01T00:12:04.725ZDEBGtest_instance_serial (dropshot_external): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) uri = /v1/instances?project=springfield-squidport
37432025-03-01T00:12:04.725ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
37442025-03-01T00:12:04.725ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
37452025-03-01T00:12:04.725ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
37462025-03-01T00:12:04.726ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37472025-03-01T00:12:04.727ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37482025-03-01T00:12:04.732ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37492025-03-01T00:12:04.733ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37502025-03-01T00:12:04.733ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37512025-03-01T00:12:04.733ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
37522025-03-01T00:12:04.737ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet
37532025-03-01T00:12:04.737ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37542025-03-01T00:12:04.738ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
37552025-03-01T00:12:04.738ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
37562025-03-01T00:12:04.738ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
37572025-03-01T00:12:04.742ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
37582025-03-01T00:12:04.744ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet result = Ok(())
37592025-03-01T00:12:04.745ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
37602025-03-01T00:12:04.745ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
37612025-03-01T00:12:04.745ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
37622025-03-01T00:12:04.768ZINFOtest_instance_serial (SagaExecutor): preparing saga saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create
37632025-03-01T00:12:04.772ZINFOtest_instance_serial (SEC): saga create dag = {"end_node":168,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[18,19,null],[19,20,null],[20,21,null],[21,22,null],[22,23,null],[23,24,null],[24,25,null],[25,26,null],[26,27,null],[27,28,null],[28,29,null],[29,30,null],[30,31,null],[31,32,null],[32,33,null],[33,34,null],[34,35,null],[35,36,null],[36,37,null],[37,38,null],[38,39,null],[39,40,null],[40,41,null],[41,42,null],[42,43,null],[43,44,null],[44,45,null],[45,46,null],[46,47,null],[47,48,null],[48,49,null],[49,50,null],[50,51,null],[51,52,null],[52,53,null],[53,54,null],[54,55,null],[55,56,null],[56,57,null],[57,58,null],[58,59,null],[59,60,null],[60,61,null],[61,62,null],[62,63,null],[63,64,null],[64,65,null],[65,66,null],[66,67,null],[67,68,null],[68,69,null],[69,70,null],[70,71,null],[71,72,null],[72,73,null],[73,74,null],[74,75,null],[75,76,null],[76,77,null],[77,78,null],[78,79,null],[79,80,null],[80,81,null],[81,82,null],[82,83,null],[83,84,null],[84,85,null],[85,86,null],[86,87,null],[87,88,null],[88,89,null],[89,90,null],[90,91,null],[91,92,null],[92,93,null],[93,94,null],[94,95,null],[95,96,null],[96,97,null],[97,98,null],[98,99,null],[99,100,null],[100,101,null],[101,102,null],[102,103,null],[103,104,null],[104,105,null],[105,106,null],[106,107,null],[107,108,null],[108,109,null],[109,110,null],[110,111,null],[111,112,null],[112,113,null],[113,114,null],[114,115,null],[115,116,null],[116,117,null],[117,118,null],[118,119,null],[119,120,null],[120,121,null],[121,122,null],[122,123,null],[123,124,null],[124,125,null],[125,126,null],[126,127,null],[127,128,null],[128,129,null],[129,130,null],[130,131,null],[131,132,null],[132,133,null],[133,134,null],[134,135,null],[135,136,null],[136,137,null],[137,138,null],[138,139,null],[139,140,null],[140,141,null],[141,142,null],[142,143,null],[143,144,null],[144,145,null],[145,146,null],[146,147,null],[147,148,null],[148,149,null],[149,150,null],[150,151,null],[151,152,null],[152,153,null],[153,154,null],[154,155,null],[155,156,null],[156,157,null],[157,158,null],[158,159,null],[159,160,null],[160,161,null],[161,162,null],[162,163,null],[163,164,null],[164,165,null],[165,166,null],[167,0,null],[166,168,null]],"node_holes":[],"nodes":[{"Constant":{"name":"instance_id","value":"e905f321-f9bd-462a-8fa7-37fb1aa527bc"}},{"Action":{"action_name":"instance_create.create_instance_record","label":"CreateInstanceRecord","name":"instance_record"}},{"Action":{"action_name":"instance_create.associate_ssh_keys","label":"AssociateSshKeys","name":"output"}},{"Constant":{"name":"network_interface_params0","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"056457f4-5d07-4fcc-acca-6b33df144cf3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"network_interface_params0","saga_name":"instance-create-nic0"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface0","name":"output"}},{"SubsagaEnd":{"name":"network_interface0"}},{"Constant":{"name":"network_interface_params1","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"aa5578bc-bd1c-40b7-8751-3ba56fd7e26c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"network_interface_params1","saga_name":"instance-create-nic1"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface1","name":"output"}},{"SubsagaEnd":{"name":"network_interface1"}},{"Constant":{"name":"network_interface_params2","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"0e7e6f1a-009c-4b85-a39b-e8ddab724ddc","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"network_interface_params2","saga_name":"instance-create-nic2"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface2","name":"output"}},{"SubsagaEnd":{"name":"network_interface2"}},{"Constant":{"name":"network_interface_params3","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"340f2089-53e6-46c7-aee3-7dfd049a336d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"network_interface_params3","saga_name":"instance-create-nic3"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface3","name":"output"}},{"SubsagaEnd":{"name":"network_interface3"}},{"Constant":{"name":"network_interface_params4","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"65640bb9-0378-45c3-8261-9efb465e65ae","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"network_interface_params4","saga_name":"instance-create-nic4"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface4","name":"output"}},{"SubsagaEnd":{"name":"network_interface4"}},{"Constant":{"name":"network_interface_params5","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"b2c4a53b-e03b-455f-8070-aed5973e69a1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"network_interface_params5","saga_name":"instance-create-nic5"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface5","name":"output"}},{"SubsagaEnd":{"name":"network_interface5"}},{"Constant":{"name":"network_interface_params6","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"2c3b4b82-e9ba-407f-b947-30f3148b99a5","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"network_interface_params6","saga_name":"instance-create-nic6"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface6","name":"output"}},{"SubsagaEnd":{"name":"network_interface6"}},{"Constant":{"name":"network_interface_params7","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"c50ec8b1-472c-4246-bf97-b09a59f176d8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"network_interface_params7","saga_name":"instance-create-nic7"}},{"Action":{"action_name":"instance_create.create_network_interface","label":"CreateNetworkInterface7","name":"output"}},{"SubsagaEnd":{"name":"network_interface7"}},{"Action":{"action_name":"common.uuid_generate","label":"CreateSnatIpId","name":"snat_ip_id"}},{"Action":{"action_name":"instance_create.create_snat_ip","label":"CreateSnatIp","name":"snat_ip"}},{"Constant":{"name":"external_ip_params0","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"19906e2f-e287-447c-8f85-113248983528","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":0}}},{"SubsagaStart":{"params_node_name":"external_ip_params0","saga_name":"instance-create-external-ip0"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp0","name":"external-ip-0"}},{"SubsagaEnd":{"name":"external_ip0"}},{"Constant":{"name":"external_ip_params1","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"9801221c-933d-40a9-a329-b622fb853e6d","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":1}}},{"SubsagaStart":{"params_node_name":"external_ip_params1","saga_name":"instance-create-external-ip1"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp1","name":"external-ip-1"}},{"SubsagaEnd":{"name":"external_ip1"}},{"Constant":{"name":"external_ip_params2","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"546c0e0d-28ca-463c-a196-426074b298f4","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":2}}},{"SubsagaStart":{"params_node_name":"external_ip_params2","saga_name":"instance-create-external-ip2"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp2","name":"external-ip-2"}},{"SubsagaEnd":{"name":"external_ip2"}},{"Constant":{"name":"external_ip_params3","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"13226f0f-e4bf-438e-9d3b-c3490af5028b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":3}}},{"SubsagaStart":{"params_node_name":"external_ip_params3","saga_name":"instance-create-external-ip3"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp3","name":"external-ip-3"}},{"SubsagaEnd":{"name":"external_ip3"}},{"Constant":{"name":"external_ip_params4","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"336ec682-af00-4c62-9025-a4232710e3a8","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":4}}},{"SubsagaStart":{"params_node_name":"external_ip_params4","saga_name":"instance-create-external-ip4"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp4","name":"external-ip-4"}},{"SubsagaEnd":{"name":"external_ip4"}},{"Constant":{"name":"external_ip_params5","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"42287f8f-15cd-4cbf-b4d4-ed6ed6ebcf0a","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":5}}},{"SubsagaStart":{"params_node_name":"external_ip_params5","saga_name":"instance-create-external-ip5"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp5","name":"external-ip-5"}},{"SubsagaEnd":{"name":"external_ip5"}},{"Constant":{"name":"external_ip_params6","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"ecc1b4c6-0c8a-440a-a156-7972fc4dfc54","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":6}}},{"SubsagaStart":{"params_node_name":"external_ip_params6","saga_name":"instance-create-external-ip6"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp6","name":"external-ip-6"}},{"SubsagaEnd":{"name":"external_ip6"}},{"Constant":{"name":"external_ip_params7","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"28142d1a-50c9-405a-87cf-281906e8a0a1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":7}}},{"SubsagaStart":{"params_node_name":"external_ip_params7","saga_name":"instance-create-external-ip7"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp7","name":"external-ip-7"}},{"SubsagaEnd":{"name":"external_ip7"}},{"Constant":{"name":"external_ip_params8","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"fcbb5a77-0400-4dcd-8cd0-800682e53968","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":8}}},{"SubsagaStart":{"params_node_name":"external_ip_params8","saga_name":"instance-create-external-ip8"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp8","name":"external-ip-8"}},{"SubsagaEnd":{"name":"external_ip8"}},{"Constant":{"name":"external_ip_params9","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"116fcda2-9619-451e-85c0-cd15cb5232d9","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":9}}},{"SubsagaStart":{"params_node_name":"external_ip_params9","saga_name":"instance-create-external-ip9"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp9","name":"external-ip-9"}},{"SubsagaEnd":{"name":"external_ip9"}},{"Constant":{"name":"external_ip_params10","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"021b2af9-d20c-4025-b56b-3c727f22cdac","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":10}}},{"SubsagaStart":{"params_node_name":"external_ip_params10","saga_name":"instance-create-external-ip10"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp10","name":"external-ip-10"}},{"SubsagaEnd":{"name":"external_ip10"}},{"Constant":{"name":"external_ip_params11","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"dd018198-e27f-4fdf-b1b5-750dd1dc2325","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":11}}},{"SubsagaStart":{"params_node_name":"external_ip_params11","saga_name":"instance-create-external-ip11"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp11","name":"external-ip-11"}},{"SubsagaEnd":{"name":"external_ip11"}},{"Constant":{"name":"external_ip_params12","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"ee2c70fc-74c0-4ad1-9ca0-ba3a60da88e1","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":12}}},{"SubsagaStart":{"params_node_name":"external_ip_params12","saga_name":"instance-create-external-ip12"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp12","name":"external-ip-12"}},{"SubsagaEnd":{"name":"external_ip12"}},{"Constant":{"name":"external_ip_params13","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"a53f16eb-8696-4223-a1bf-d7144301adc2","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":13}}},{"SubsagaStart":{"params_node_name":"external_ip_params13","saga_name":"instance-create-external-ip13"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp13","name":"external-ip-13"}},{"SubsagaEnd":{"name":"external_ip13"}},{"Constant":{"name":"external_ip_params14","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"7bd314a0-9744-42df-a6f1-21eb9f32f77c","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":14}}},{"SubsagaStart":{"params_node_name":"external_ip_params14","saga_name":"instance-create-external-ip14"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp14","name":"external-ip-14"}},{"SubsagaEnd":{"name":"external_ip14"}},{"Constant":{"name":"external_ip_params15","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"6d688e5b-6143-4083-ad8f-19dc3c93a5c3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":15}}},{"SubsagaStart":{"params_node_name":"external_ip_params15","saga_name":"instance-create-external-ip15"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp15","name":"external-ip-15"}},{"SubsagaEnd":{"name":"external_ip15"}},{"Constant":{"name":"external_ip_params16","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"2d4f855a-29c1-4ed3-81c7-621a1b6bc715","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":16}}},{"SubsagaStart":{"params_node_name":"external_ip_params16","saga_name":"instance-create-external-ip16"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp16","name":"external-ip-16"}},{"SubsagaEnd":{"name":"external_ip16"}},{"Constant":{"name":"external_ip_params17","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"db8a9bc1-068c-494a-9f2b-5518e5ae79bd","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":17}}},{"SubsagaStart":{"params_node_name":"external_ip_params17","saga_name":"instance-create-external-ip17"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp17","name":"external-ip-17"}},{"SubsagaEnd":{"name":"external_ip17"}},{"Constant":{"name":"external_ip_params18","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"ce478a4a-7217-4d49-aea8-6fc8e4d932b3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":18}}},{"SubsagaStart":{"params_node_name":"external_ip_params18","saga_name":"instance-create-external-ip18"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp18","name":"external-ip-18"}},{"SubsagaEnd":{"name":"external_ip18"}},{"Constant":{"name":"external_ip_params19","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"04de440b-d151-4381-a60c-2a42594057e0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":19}}},{"SubsagaStart":{"params_node_name":"external_ip_params19","saga_name":"instance-create-external-ip19"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp19","name":"external-ip-19"}},{"SubsagaEnd":{"name":"external_ip19"}},{"Constant":{"name":"external_ip_params20","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"b5e310f4-7b22-4cc0-88c9-d9a05c10fe98","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":20}}},{"SubsagaStart":{"params_node_name":"external_ip_params20","saga_name":"instance-create-external-ip20"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp20","name":"external-ip-20"}},{"SubsagaEnd":{"name":"external_ip20"}},{"Constant":{"name":"external_ip_params21","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"6c368183-f470-470d-9773-9297438e6eb0","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":21}}},{"SubsagaStart":{"params_node_name":"external_ip_params21","saga_name":"instance-create-external-ip21"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp21","name":"external-ip-21"}},{"SubsagaEnd":{"name":"external_ip21"}},{"Constant":{"name":"external_ip_params22","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"5339ee19-a230-4fe0-88d0-10387e054c21","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":22}}},{"SubsagaStart":{"params_node_name":"external_ip_params22","saga_name":"instance-create-external-ip22"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp22","name":"external-ip-22"}},{"SubsagaEnd":{"name":"external_ip22"}},{"Constant":{"name":"external_ip_params23","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"e54c4404-8313-4730-a619-56ccba15eaa3","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":23}}},{"SubsagaStart":{"params_node_name":"external_ip_params23","saga_name":"instance-create-external-ip23"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp23","name":"external-ip-23"}},{"SubsagaEnd":{"name":"external_ip23"}},{"Constant":{"name":"external_ip_params24","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"ff10edd3-e1e3-42c5-96d0-da00460de303","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":24}}},{"SubsagaStart":{"params_node_name":"external_ip_params24","saga_name":"instance-create-external-ip24"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp24","name":"external-ip-24"}},{"SubsagaEnd":{"name":"external_ip24"}},{"Constant":{"name":"external_ip_params25","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"bb1bd592-b4ef-4fdb-8f92-82d665d8b3cb","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":25}}},{"SubsagaStart":{"params_node_name":"external_ip_params25","saga_name":"instance-create-external-ip25"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp25","name":"external-ip-25"}},{"SubsagaEnd":{"name":"external_ip25"}},{"Constant":{"name":"external_ip_params26","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"6a56b8d3-8d97-4b74-854b-b65f102adf42","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":26}}},{"SubsagaStart":{"params_node_name":"external_ip_params26","saga_name":"instance-create-external-ip26"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp26","name":"external-ip-26"}},{"SubsagaEnd":{"name":"external_ip26"}},{"Constant":{"name":"external_ip_params27","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"31373b71-4861-45ae-a277-796a47c2ff8e","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":27}}},{"SubsagaStart":{"params_node_name":"external_ip_params27","saga_name":"instance-create-external-ip27"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp27","name":"external-ip-27"}},{"SubsagaEnd":{"name":"external_ip27"}},{"Constant":{"name":"external_ip_params28","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"9cf6840e-c2e0-4bc1-9e8d-5fb01bb5237e","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":28}}},{"SubsagaStart":{"params_node_name":"external_ip_params28","saga_name":"instance-create-external-ip28"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp28","name":"external-ip-28"}},{"SubsagaEnd":{"name":"external_ip28"}},{"Constant":{"name":"external_ip_params29","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"88536628-2ebe-474a-a565-621210192073","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":29}}},{"SubsagaStart":{"params_node_name":"external_ip_params29","saga_name":"instance-create-external-ip29"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp29","name":"external-ip-29"}},{"SubsagaEnd":{"name":"external_ip29"}},{"Constant":{"name":"external_ip_params30","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"db49e4b5-28ff-4433-93db-cc1f95534e1b","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":30}}},{"SubsagaStart":{"params_node_name":"external_ip_params30","saga_name":"instance-create-external-ip30"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp30","name":"external-ip-30"}},{"SubsagaEnd":{"name":"external_ip30"}},{"Constant":{"name":"external_ip_params31","value":{"instance_id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","new_id":"314e2ae8-e8b3-4f5d-bfce-203fe0acd91f","saga_params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}},"which":31}}},{"SubsagaStart":{"params_node_name":"external_ip_params31","saga_name":"instance-create-external-ip31"}},{"Action":{"action_name":"instance_create.create_external_ip","label":"CreateExternalIp31","name":"external-ip-31"}},{"SubsagaEnd":{"name":"external_ip31"}},{"Action":{"action_name":"instance_create.set_boot_disk","label":"SetBootDisk","name":"set_boot_disk"}},{"Action":{"action_name":"instance_create.move_to_stopped","label":"MoveToStopped","name":"stopped_instance"}},{"Start":{"params":{"boundary_switches":[],"create_params":{"auto_restart_policy":null,"boot_disk":null,"description":"instance \\"kris-picks\\"","disks":[],"external_ips":[],"hostname":"the-host","memory":1073741824,"name":"kris-picks","ncpus":4,"network_interfaces":{"type":"default"},"ssh_public_keys":[],"start":true,"user_data":"I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ=="},"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-create","start_node":167} saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37642025-03-01T00:12:04.774ZINFOtest_instance_serial (SecStore): creating saga saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create
37652025-03-01T00:12:04.788ZINFOtest_instance_serial (SagaExecutor): starting saga saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create
37662025-03-01T00:12:04.788ZINFOtest_instance_serial (SEC): saga start saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37672025-03-01T00:12:04.789ZDEBGtest_instance_serial (SEC): saga log event new_state = N167 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37682025-03-01T00:12:04.789ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 167 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
37692025-03-01T00:12:04.799ZDEBGtest_instance_serial (SEC): saga log event new_state = N167 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37702025-03-01T00:12:04.799ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 167 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
37712025-03-01T00:12:04.807ZDEBGtest_instance_serial (SEC): saga log event new_state = N000 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37722025-03-01T00:12:04.807ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
37732025-03-01T00:12:04.813ZDEBGtest_instance_serial (SEC): saga log event new_state = N000 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37742025-03-01T00:12:04.813ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("e905f321-f9bd-462a-8fa7-37fb1aa527bc")) node_id = 0 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
37752025-03-01T00:12:04.821ZDEBGtest_instance_serial (SEC): saga log event new_state = N001 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
37762025-03-01T00:12:04.822ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
37772025-03-01T00:12:04.827ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37782025-03-01T00:12:04.828ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37792025-03-01T00:12:04.828ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37802025-03-01T00:12:04.830ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37812025-03-01T00:12:04.830ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37822025-03-01T00:12:04.830ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37832025-03-01T00:12:04.836ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37842025-03-01T00:12:04.836ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37852025-03-01T00:12:04.836ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37862025-03-01T00:12:04.836ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37872025-03-01T00:12:04.837ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37882025-03-01T00:12:04.844ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37892025-03-01T00:12:04.845ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37902025-03-01T00:12:04.845ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37912025-03-01T00:12:04.845ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37922025-03-01T00:12:04.848ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37932025-03-01T00:12:04.848ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37942025-03-01T00:12:04.848ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37952025-03-01T00:12:04.849ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37962025-03-01T00:12:04.852ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37972025-03-01T00:12:04.859ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) } result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37982025-03-01T00:12:04.859ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
37992025-03-01T00:12:04.859ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38002025-03-01T00:12:04.859ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38012025-03-01T00:12:04.859ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38022025-03-01T00:12:04.861ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38032025-03-01T00:12:04.862ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38042025-03-01T00:12:04.862ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38052025-03-01T00:12:04.862ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38062025-03-01T00:12:04.863ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38072025-03-01T00:12:04.865ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38082025-03-01T00:12:04.866ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38092025-03-01T00:12:04.866ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38102025-03-01T00:12:04.866ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38112025-03-01T00:12:04.868ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38122025-03-01T00:12:04.875ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) } result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38132025-03-01T00:12:04.875ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38142025-03-01T00:12:04.875ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38152025-03-01T00:12:04.876ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateInstanceRecord
38162025-03-01T00:12:04.961ZDEBGtest_instance_serial (SEC): saga log event new_state = N001 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
38172025-03-01T00:12:04.962ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}) node_id = 1 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
38182025-03-01T00:12:04.973ZDEBGtest_instance_serial (SEC): saga log event new_state = N002 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
38192025-03-01T00:12:04.973ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
38202025-03-01T00:12:04.983ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38212025-03-01T00:12:04.983ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38222025-03-01T00:12:04.984ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38232025-03-01T00:12:04.985ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38242025-03-01T00:12:04.987ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38252025-03-01T00:12:04.987ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38262025-03-01T00:12:04.988ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38272025-03-01T00:12:04.989ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38282025-03-01T00:12:04.989ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38292025-03-01T00:12:04.989ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38302025-03-01T00:12:04.989ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38312025-03-01T00:12:04.991ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38322025-03-01T00:12:04.991ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38332025-03-01T00:12:04.991ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38342025-03-01T00:12:04.992ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38352025-03-01T00:12:04.995ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38362025-03-01T00:12:04.997ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38372025-03-01T00:12:05.002ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38382025-03-01T00:12:05.002ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38392025-03-01T00:12:05.003ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38402025-03-01T00:12:05.003ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38412025-03-01T00:12:05.003ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38422025-03-01T00:12:05.003ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38432025-03-01T00:12:05.004ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38442025-03-01T00:12:05.004ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38452025-03-01T00:12:05.004ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38462025-03-01T00:12:05.014ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38472025-03-01T00:12:05.016ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = AssociateSshKeys
38482025-03-01T00:12:05.016ZDEBGtest_instance_serial (SEC): saga log event new_state = N002 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
38492025-03-01T00:12:05.016ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
38502025-03-01T00:12:05.022ZDEBGtest_instance_serial (SEC): saga log event new_state = N003 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
38512025-03-01T00:12:05.023ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
38522025-03-01T00:12:05.040ZDEBGtest_instance_serial (SEC): saga log event new_state = N003 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
38532025-03-01T00:12:05.040ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("056457f4-5d07-4fcc-acca-6b33df144cf3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 3 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
38542025-03-01T00:12:05.058ZDEBGtest_instance_serial (SEC): saga log event new_state = N004 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
38552025-03-01T00:12:05.058ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
38562025-03-01T00:12:05.069ZDEBGtest_instance_serial (SEC): saga log event new_state = N004 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
38572025-03-01T00:12:05.070ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 4 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
38582025-03-01T00:12:05.077ZDEBGtest_instance_serial (SEC): saga log event new_state = N005 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
38592025-03-01T00:12:05.077ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
38602025-03-01T00:12:05.086ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38612025-03-01T00:12:05.086ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38622025-03-01T00:12:05.087ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38632025-03-01T00:12:05.089ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
38642025-03-01T00:12:05.089ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
38652025-03-01T00:12:05.091ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
38662025-03-01T00:12:05.094ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38672025-03-01T00:12:05.095ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38682025-03-01T00:12:05.095ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38692025-03-01T00:12:05.098ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38702025-03-01T00:12:05.100ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38712025-03-01T00:12:05.100ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38722025-03-01T00:12:05.104ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
38732025-03-01T00:12:05.106ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
38742025-03-01T00:12:05.106ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38752025-03-01T00:12:05.106ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38762025-03-01T00:12:05.106ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38772025-03-01T00:12:05.106ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38782025-03-01T00:12:05.106ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38792025-03-01T00:12:05.109ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
38802025-03-01T00:12:05.110ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
38812025-03-01T00:12:05.110ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38822025-03-01T00:12:05.110ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38832025-03-01T00:12:05.110ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38842025-03-01T00:12:05.110ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38852025-03-01T00:12:05.123ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38862025-03-01T00:12:05.123ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38872025-03-01T00:12:05.123ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38882025-03-01T00:12:05.124ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38892025-03-01T00:12:05.127ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38902025-03-01T00:12:05.134ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38912025-03-01T00:12:05.135ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38922025-03-01T00:12:05.135ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38932025-03-01T00:12:05.135ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38942025-03-01T00:12:05.136ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38952025-03-01T00:12:05.137ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38962025-03-01T00:12:05.137ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38972025-03-01T00:12:05.139ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38982025-03-01T00:12:05.139ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
38992025-03-01T00:12:05.140ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39002025-03-01T00:12:05.142ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39012025-03-01T00:12:05.142ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39022025-03-01T00:12:05.143ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39032025-03-01T00:12:05.146ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39042025-03-01T00:12:05.147ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39052025-03-01T00:12:05.147ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39062025-03-01T00:12:05.147ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39072025-03-01T00:12:05.148ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39082025-03-01T00:12:05.154ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39092025-03-01T00:12:05.154ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39102025-03-01T00:12:05.154ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39112025-03-01T00:12:05.155ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39122025-03-01T00:12:05.159ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39132025-03-01T00:12:05.160ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39142025-03-01T00:12:05.160ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39152025-03-01T00:12:05.160ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39162025-03-01T00:12:05.164ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39172025-03-01T00:12:05.182ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") } result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39182025-03-01T00:12:05.182ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39192025-03-01T00:12:05.182ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39202025-03-01T00:12:05.182ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39212025-03-01T00:12:05.182ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39222025-03-01T00:12:05.183ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39232025-03-01T00:12:05.195ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39242025-03-01T00:12:05.197ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39252025-03-01T00:12:05.197ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39262025-03-01T00:12:05.197ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39272025-03-01T00:12:05.201ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39282025-03-01T00:12:05.201ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39292025-03-01T00:12:05.202ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39302025-03-01T00:12:05.202ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39312025-03-01T00:12:05.206ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39322025-03-01T00:12:05.212ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39332025-03-01T00:12:05.212ZTRACtest_instance_serial (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39342025-03-01T00:12:05.212ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39352025-03-01T00:12:05.214ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39362025-03-01T00:12:05.214ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39372025-03-01T00:12:05.214ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39382025-03-01T00:12:05.221ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39392025-03-01T00:12:05.222ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39402025-03-01T00:12:05.222ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39412025-03-01T00:12:05.222ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39422025-03-01T00:12:05.225ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39432025-03-01T00:12:05.225ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39442025-03-01T00:12:05.225ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39452025-03-01T00:12:05.226ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39462025-03-01T00:12:05.229ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39472025-03-01T00:12:05.237ZDEBGtest_instance_serial (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") } result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39482025-03-01T00:12:05.238ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39492025-03-01T00:12:05.240ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39502025-03-01T00:12:05.242ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39512025-03-01T00:12:05.285ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39522025-03-01T00:12:05.285ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39532025-03-01T00:12:05.287ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateNetworkInterface0
39542025-03-01T00:12:05.300ZDEBGtest_instance_serial (SEC): saga log event new_state = N005 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39552025-03-01T00:12:05.300ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39562025-03-01T00:12:05.306ZDEBGtest_instance_serial (SEC): saga log event new_state = N006 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39572025-03-01T00:12:05.307ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39582025-03-01T00:12:05.312ZDEBGtest_instance_serial (SEC): saga log event new_state = N006 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39592025-03-01T00:12:05.313ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39602025-03-01T00:12:05.319ZDEBGtest_instance_serial (SEC): saga log event new_state = N007 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39612025-03-01T00:12:05.323ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39622025-03-01T00:12:05.324ZDEBGtest_instance_serial (SEC): saga log event new_state = N007 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39632025-03-01T00:12:05.325ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("aa5578bc-bd1c-40b7-8751-3ba56fd7e26c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 7 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39642025-03-01T00:12:05.331ZDEBGtest_instance_serial (SEC): saga log event new_state = N008 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39652025-03-01T00:12:05.332ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39662025-03-01T00:12:05.335ZDEBGtest_instance_serial (SEC): saga log event new_state = N008 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39672025-03-01T00:12:05.337ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39682025-03-01T00:12:05.341ZDEBGtest_instance_serial (SEC): saga log event new_state = N009 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39692025-03-01T00:12:05.341ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39702025-03-01T00:12:05.347ZDEBGtest_instance_serial (SEC): saga log event new_state = N009 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39712025-03-01T00:12:05.349ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39722025-03-01T00:12:05.356ZDEBGtest_instance_serial (SEC): saga log event new_state = N010 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39732025-03-01T00:12:05.356ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39742025-03-01T00:12:05.362ZDEBGtest_instance_serial (SEC): saga log event new_state = N010 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39752025-03-01T00:12:05.363ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39762025-03-01T00:12:05.369ZDEBGtest_instance_serial (SEC): saga log event new_state = N011 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39772025-03-01T00:12:05.370ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39782025-03-01T00:12:05.375ZDEBGtest_instance_serial (SEC): saga log event new_state = N011 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39792025-03-01T00:12:05.375ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("0e7e6f1a-009c-4b85-a39b-e8ddab724ddc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 11 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39802025-03-01T00:12:05.382ZDEBGtest_instance_serial (SEC): saga log event new_state = N012 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39812025-03-01T00:12:05.383ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 12 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39822025-03-01T00:12:05.392ZDEBGtest_instance_serial (SEC): saga log event new_state = N012 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39832025-03-01T00:12:05.392ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39842025-03-01T00:12:05.399ZDEBGtest_instance_serial (SEC): saga log event new_state = N013 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39852025-03-01T00:12:05.399ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 13 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39862025-03-01T00:12:05.407ZDEBGtest_instance_serial (SEC): saga log event new_state = N013 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39872025-03-01T00:12:05.408ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39882025-03-01T00:12:05.413ZDEBGtest_instance_serial (SEC): saga log event new_state = N014 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39892025-03-01T00:12:05.414ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 14 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39902025-03-01T00:12:05.421ZDEBGtest_instance_serial (SEC): saga log event new_state = N014 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39912025-03-01T00:12:05.421ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 14 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39922025-03-01T00:12:05.427ZDEBGtest_instance_serial (SEC): saga log event new_state = N015 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39932025-03-01T00:12:05.427ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 15 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39942025-03-01T00:12:05.432ZDEBGtest_instance_serial (SEC): saga log event new_state = N015 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39952025-03-01T00:12:05.433ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("340f2089-53e6-46c7-aee3-7dfd049a336d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 15 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39962025-03-01T00:12:05.438ZDEBGtest_instance_serial (SEC): saga log event new_state = N016 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39972025-03-01T00:12:05.439ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 16 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
39982025-03-01T00:12:05.444ZDEBGtest_instance_serial (SEC): saga log event new_state = N016 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
39992025-03-01T00:12:05.445ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40002025-03-01T00:12:05.451ZDEBGtest_instance_serial (SEC): saga log event new_state = N017 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40012025-03-01T00:12:05.451ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 17 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40022025-03-01T00:12:05.457ZDEBGtest_instance_serial (SEC): saga log event new_state = N017 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40032025-03-01T00:12:05.459ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 17 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40042025-03-01T00:12:05.464ZDEBGtest_instance_serial (SEC): saga log event new_state = N018 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40052025-03-01T00:12:05.465ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 18 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40062025-03-01T00:12:05.469ZDEBGtest_instance_serial (SEC): saga log event new_state = N018 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40072025-03-01T00:12:05.470ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40082025-03-01T00:12:05.474ZDEBGtest_instance_serial (SEC): saga log event new_state = N019 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40092025-03-01T00:12:05.474ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 19 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40102025-03-01T00:12:05.480ZDEBGtest_instance_serial (SEC): saga log event new_state = N019 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40112025-03-01T00:12:05.480ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("65640bb9-0378-45c3-8261-9efb465e65ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 19 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40122025-03-01T00:12:05.488ZDEBGtest_instance_serial (SEC): saga log event new_state = N020 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40132025-03-01T00:12:05.488ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 20 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40142025-03-01T00:12:05.500ZDEBGtest_instance_serial (SEC): saga log event new_state = N020 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40152025-03-01T00:12:05.500ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40162025-03-01T00:12:05.505ZDEBGtest_instance_serial (SEC): saga log event new_state = N021 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40172025-03-01T00:12:05.506ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 21 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40182025-03-01T00:12:05.513ZDEBGtest_instance_serial (SEC): saga log event new_state = N021 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40192025-03-01T00:12:05.514ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40202025-03-01T00:12:05.519ZDEBGtest_instance_serial (SEC): saga log event new_state = N022 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40212025-03-01T00:12:05.521ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 22 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40222025-03-01T00:12:05.524ZDEBGtest_instance_serial (SEC): saga log event new_state = N022 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40232025-03-01T00:12:05.524ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 22 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40242025-03-01T00:12:05.533ZDEBGtest_instance_serial (SEC): saga log event new_state = N023 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40252025-03-01T00:12:05.534ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 23 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40262025-03-01T00:12:05.537ZDEBGtest_instance_serial (SEC): saga log event new_state = N023 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40272025-03-01T00:12:05.538ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b2c4a53b-e03b-455f-8070-aed5973e69a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 23 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40282025-03-01T00:12:05.544ZDEBGtest_instance_serial (SEC): saga log event new_state = N024 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40292025-03-01T00:12:05.545ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 24 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40302025-03-01T00:12:05.549ZDEBGtest_instance_serial (SEC): saga log event new_state = N024 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40312025-03-01T00:12:05.550ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 24 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40322025-03-01T00:12:05.555ZDEBGtest_instance_serial (SEC): saga log event new_state = N025 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40332025-03-01T00:12:05.556ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 25 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40342025-03-01T00:12:05.563ZDEBGtest_instance_serial (SEC): saga log event new_state = N025 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40352025-03-01T00:12:05.564ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 25 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40362025-03-01T00:12:05.570ZDEBGtest_instance_serial (SEC): saga log event new_state = N026 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40372025-03-01T00:12:05.570ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 26 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40382025-03-01T00:12:05.575ZDEBGtest_instance_serial (SEC): saga log event new_state = N026 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40392025-03-01T00:12:05.576ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 26 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40402025-03-01T00:12:05.584ZDEBGtest_instance_serial (SEC): saga log event new_state = N027 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40412025-03-01T00:12:05.584ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 27 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40422025-03-01T00:12:05.591ZDEBGtest_instance_serial (SEC): saga log event new_state = N027 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40432025-03-01T00:12:05.591ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2c3b4b82-e9ba-407f-b947-30f3148b99a5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 27 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40442025-03-01T00:12:05.600ZDEBGtest_instance_serial (SEC): saga log event new_state = N028 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40452025-03-01T00:12:05.600ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 28 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40462025-03-01T00:12:05.612ZDEBGtest_instance_serial (SEC): saga log event new_state = N028 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40472025-03-01T00:12:05.612ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 28 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40482025-03-01T00:12:05.621ZDEBGtest_instance_serial (SEC): saga log event new_state = N029 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40492025-03-01T00:12:05.625ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 29 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40502025-03-01T00:12:05.629ZDEBGtest_instance_serial (SEC): saga log event new_state = N029 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40512025-03-01T00:12:05.629ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 29 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40522025-03-01T00:12:05.634ZDEBGtest_instance_serial (SEC): saga log event new_state = N030 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40532025-03-01T00:12:05.636ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 30 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40542025-03-01T00:12:05.640ZDEBGtest_instance_serial (SEC): saga log event new_state = N030 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40552025-03-01T00:12:05.640ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 30 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40562025-03-01T00:12:05.650ZDEBGtest_instance_serial (SEC): saga log event new_state = N031 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40572025-03-01T00:12:05.650ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 31 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40582025-03-01T00:12:05.655ZDEBGtest_instance_serial (SEC): saga log event new_state = N031 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40592025-03-01T00:12:05.657ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("c50ec8b1-472c-4246-bf97-b09a59f176d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 31 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40602025-03-01T00:12:05.664ZDEBGtest_instance_serial (SEC): saga log event new_state = N032 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40612025-03-01T00:12:05.664ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 32 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40622025-03-01T00:12:05.673ZDEBGtest_instance_serial (SEC): saga log event new_state = N032 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40632025-03-01T00:12:05.674ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 32 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40642025-03-01T00:12:05.679ZDEBGtest_instance_serial (SEC): saga log event new_state = N033 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40652025-03-01T00:12:05.679ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 33 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40662025-03-01T00:12:05.686ZDEBGtest_instance_serial (SEC): saga log event new_state = N033 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40672025-03-01T00:12:05.686ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 33 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40682025-03-01T00:12:05.691ZDEBGtest_instance_serial (SEC): saga log event new_state = N034 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40692025-03-01T00:12:05.692ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 34 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40702025-03-01T00:12:05.698ZDEBGtest_instance_serial (SEC): saga log event new_state = N034 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40712025-03-01T00:12:05.698ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 34 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40722025-03-01T00:12:05.704ZDEBGtest_instance_serial (SEC): saga log event new_state = N035 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40732025-03-01T00:12:05.704ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 35 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40742025-03-01T00:12:05.709ZDEBGtest_instance_serial (SEC): saga log event new_state = N035 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40752025-03-01T00:12:05.710ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("cb3d1189-9b27-419b-99d8-28973ff330dc")) node_id = 35 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40762025-03-01T00:12:05.717ZDEBGtest_instance_serial (SEC): saga log event new_state = N036 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40772025-03-01T00:12:05.721ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 36 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40782025-03-01T00:12:05.723ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40792025-03-01T00:12:05.725ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40802025-03-01T00:12:05.731ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateSnatIp
40812025-03-01T00:12:05.732ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateSnatIp
40822025-03-01T00:12:05.732ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateSnatIp
40832025-03-01T00:12:05.733ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40842025-03-01T00:12:05.734ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40852025-03-01T00:12:05.735ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40862025-03-01T00:12:05.735ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
40872025-03-01T00:12:05.813ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateSnatIp
40882025-03-01T00:12:05.813ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateSnatIp
40892025-03-01T00:12:05.814ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_node = CreateSnatIp
40902025-03-01T00:12:06.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
40912025-03-01T00:12:06.091ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
40922025-03-01T00:12:06.091ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
40932025-03-01T00:12:06.093ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
40942025-03-01T00:12:06.095ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
40952025-03-01T00:12:06.110ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
40962025-03-01T00:12:06.110ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
40972025-03-01T00:12:06.219ZDEBGtest_instance_serial (SEC): saga log event new_state = N036 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
40982025-03-01T00:12:06.224ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 36 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
40992025-03-01T00:12:06.232ZDEBGtest_instance_serial (SEC): saga log event new_state = N037 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41002025-03-01T00:12:06.234ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 37 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41012025-03-01T00:12:06.243ZDEBGtest_instance_serial (SEC): saga log event new_state = N037 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41022025-03-01T00:12:06.243ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("19906e2f-e287-447c-8f85-113248983528"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}) node_id = 37 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41032025-03-01T00:12:06.249ZDEBGtest_instance_serial (SEC): saga log event new_state = N038 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41042025-03-01T00:12:06.250ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 38 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41052025-03-01T00:12:06.255ZDEBGtest_instance_serial (SEC): saga log event new_state = N038 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41062025-03-01T00:12:06.256ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 38 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41072025-03-01T00:12:06.260ZDEBGtest_instance_serial (SEC): saga log event new_state = N039 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41082025-03-01T00:12:06.260ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 39 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41092025-03-01T00:12:06.269ZDEBGtest_instance_serial (SEC): saga log event new_state = N039 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41102025-03-01T00:12:06.269ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 39 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41112025-03-01T00:12:06.276ZDEBGtest_instance_serial (SEC): saga log event new_state = N040 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41122025-03-01T00:12:06.277ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 40 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41132025-03-01T00:12:06.283ZDEBGtest_instance_serial (SEC): saga log event new_state = N040 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41142025-03-01T00:12:06.283ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 40 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41152025-03-01T00:12:06.289ZDEBGtest_instance_serial (SEC): saga log event new_state = N041 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41162025-03-01T00:12:06.290ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 41 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41172025-03-01T00:12:06.296ZDEBGtest_instance_serial (SEC): saga log event new_state = N041 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41182025-03-01T00:12:06.296ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9801221c-933d-40a9-a329-b622fb853e6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}) node_id = 41 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41192025-03-01T00:12:06.308ZDEBGtest_instance_serial (SEC): saga log event new_state = N042 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41202025-03-01T00:12:06.308ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 42 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41212025-03-01T00:12:06.317ZDEBGtest_instance_serial (SEC): saga log event new_state = N042 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41222025-03-01T00:12:06.317ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 42 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41232025-03-01T00:12:06.335ZDEBGtest_instance_serial (SEC): saga log event new_state = N043 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41242025-03-01T00:12:06.335ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 43 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41252025-03-01T00:12:06.343ZDEBGtest_instance_serial (SEC): saga log event new_state = N043 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41262025-03-01T00:12:06.344ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 43 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41272025-03-01T00:12:06.354ZDEBGtest_instance_serial (SEC): saga log event new_state = N044 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41282025-03-01T00:12:06.354ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 44 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41292025-03-01T00:12:06.362ZDEBGtest_instance_serial (SEC): saga log event new_state = N044 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41302025-03-01T00:12:06.362ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 44 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41312025-03-01T00:12:06.372ZDEBGtest_instance_serial (SEC): saga log event new_state = N045 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41322025-03-01T00:12:06.372ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 45 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41332025-03-01T00:12:06.380ZDEBGtest_instance_serial (SEC): saga log event new_state = N045 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41342025-03-01T00:12:06.380ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("546c0e0d-28ca-463c-a196-426074b298f4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}) node_id = 45 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41352025-03-01T00:12:06.389ZDEBGtest_instance_serial (SEC): saga log event new_state = N046 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41362025-03-01T00:12:06.389ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 46 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41372025-03-01T00:12:06.396ZDEBGtest_instance_serial (SEC): saga log event new_state = N046 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41382025-03-01T00:12:06.396ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 46 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41392025-03-01T00:12:06.409ZDEBGtest_instance_serial (SEC): saga log event new_state = N047 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41402025-03-01T00:12:06.409ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 47 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41412025-03-01T00:12:06.420ZDEBGtest_instance_serial (SEC): saga log event new_state = N047 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41422025-03-01T00:12:06.427ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 47 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41432025-03-01T00:12:06.442ZDEBGtest_instance_serial (SEC): saga log event new_state = N048 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41442025-03-01T00:12:06.444ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 48 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41452025-03-01T00:12:06.448ZDEBGtest_instance_serial (SEC): saga log event new_state = N048 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41462025-03-01T00:12:06.448ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 48 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41472025-03-01T00:12:06.454ZDEBGtest_instance_serial (SEC): saga log event new_state = N049 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41482025-03-01T00:12:06.454ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 49 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41492025-03-01T00:12:06.460ZDEBGtest_instance_serial (SEC): saga log event new_state = N049 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41502025-03-01T00:12:06.460ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("13226f0f-e4bf-438e-9d3b-c3490af5028b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}) node_id = 49 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41512025-03-01T00:12:06.470ZDEBGtest_instance_serial (SEC): saga log event new_state = N050 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41522025-03-01T00:12:06.470ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 50 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41532025-03-01T00:12:06.479ZDEBGtest_instance_serial (SEC): saga log event new_state = N050 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41542025-03-01T00:12:06.480ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 50 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41552025-03-01T00:12:06.484ZDEBGtest_instance_serial (SEC): saga log event new_state = N051 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41562025-03-01T00:12:06.487ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 51 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41572025-03-01T00:12:06.490ZDEBGtest_instance_serial (SEC): saga log event new_state = N051 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41582025-03-01T00:12:06.491ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 51 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41592025-03-01T00:12:06.495ZDEBGtest_instance_serial (SEC): saga log event new_state = N052 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41602025-03-01T00:12:06.495ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 52 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41612025-03-01T00:12:06.501ZDEBGtest_instance_serial (SEC): saga log event new_state = N052 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41622025-03-01T00:12:06.501ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 52 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41632025-03-01T00:12:06.509ZDEBGtest_instance_serial (SEC): saga log event new_state = N053 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41642025-03-01T00:12:06.509ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 53 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41652025-03-01T00:12:06.519ZDEBGtest_instance_serial (SEC): saga log event new_state = N053 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41662025-03-01T00:12:06.519ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("336ec682-af00-4c62-9025-a4232710e3a8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}) node_id = 53 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41672025-03-01T00:12:06.525ZDEBGtest_instance_serial (SEC): saga log event new_state = N054 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41682025-03-01T00:12:06.525ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 54 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41692025-03-01T00:12:06.534ZDEBGtest_instance_serial (SEC): saga log event new_state = N054 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41702025-03-01T00:12:06.534ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 54 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41712025-03-01T00:12:06.541ZDEBGtest_instance_serial (SEC): saga log event new_state = N055 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41722025-03-01T00:12:06.541ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 55 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41732025-03-01T00:12:06.547ZDEBGtest_instance_serial (SEC): saga log event new_state = N055 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41742025-03-01T00:12:06.548ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 55 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41752025-03-01T00:12:06.552ZDEBGtest_instance_serial (SEC): saga log event new_state = N056 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41762025-03-01T00:12:06.552ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 56 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41772025-03-01T00:12:06.559ZDEBGtest_instance_serial (SEC): saga log event new_state = N056 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41782025-03-01T00:12:06.560ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 56 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41792025-03-01T00:12:06.566ZDEBGtest_instance_serial (SEC): saga log event new_state = N057 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41802025-03-01T00:12:06.566ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 57 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41812025-03-01T00:12:06.572ZDEBGtest_instance_serial (SEC): saga log event new_state = N057 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41822025-03-01T00:12:06.572ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("42287f8f-15cd-4cbf-b4d4-ed6ed6ebcf0a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}) node_id = 57 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41832025-03-01T00:12:06.580ZDEBGtest_instance_serial (SEC): saga log event new_state = N058 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41842025-03-01T00:12:06.580ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 58 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41852025-03-01T00:12:06.586ZDEBGtest_instance_serial (SEC): saga log event new_state = N058 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41862025-03-01T00:12:06.587ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 58 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41872025-03-01T00:12:06.593ZDEBGtest_instance_serial (SEC): saga log event new_state = N059 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41882025-03-01T00:12:06.594ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 59 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41892025-03-01T00:12:06.599ZDEBGtest_instance_serial (SEC): saga log event new_state = N059 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41902025-03-01T00:12:06.599ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 59 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41912025-03-01T00:12:06.605ZDEBGtest_instance_serial (SEC): saga log event new_state = N060 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41922025-03-01T00:12:06.606ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 60 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41932025-03-01T00:12:06.610ZDEBGtest_instance_serial (SEC): saga log event new_state = N060 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41942025-03-01T00:12:06.610ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 60 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41952025-03-01T00:12:06.617ZDEBGtest_instance_serial (SEC): saga log event new_state = N061 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41962025-03-01T00:12:06.618ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 61 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41972025-03-01T00:12:06.623ZDEBGtest_instance_serial (SEC): saga log event new_state = N061 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
41982025-03-01T00:12:06.623ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ecc1b4c6-0c8a-440a-a156-7972fc4dfc54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}) node_id = 61 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
41992025-03-01T00:12:06.629ZDEBGtest_instance_serial (SEC): saga log event new_state = N062 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42002025-03-01T00:12:06.629ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 62 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42012025-03-01T00:12:06.636ZDEBGtest_instance_serial (SEC): saga log event new_state = N062 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42022025-03-01T00:12:06.638ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 62 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42032025-03-01T00:12:06.642ZDEBGtest_instance_serial (SEC): saga log event new_state = N063 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42042025-03-01T00:12:06.642ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 63 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42052025-03-01T00:12:06.646ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
42062025-03-01T00:12:06.646ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
42072025-03-01T00:12:06.647ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
42082025-03-01T00:12:06.648ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
42092025-03-01T00:12:06.648ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
42102025-03-01T00:12:06.649ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
42112025-03-01T00:12:06.649ZDEBGtest_instance_serial (SEC): saga log event new_state = N063 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42122025-03-01T00:12:06.649ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 63 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42132025-03-01T00:12:06.651ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 4253 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7198eb22-a2d1-4b8e-a1d9-ded3468a453f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
42142025-03-01T00:12:06.651ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "7198eb22-a2d1-4b8e-a1d9-ded3468a453f", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:05 GMT"} })
42152025-03-01T00:12:06.652ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
42162025-03-01T00:12:06.652ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7762d833-18f3-48e4-be2a-fa98a619d370 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
42172025-03-01T00:12:06.653ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7762d833-18f3-48e4-be2a-fa98a619d370 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
42182025-03-01T00:12:06.653ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7762d833-18f3-48e4-be2a-fa98a619d370 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
42192025-03-01T00:12:06.653ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7762d833-18f3-48e4-be2a-fa98a619d370 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
42202025-03-01T00:12:06.654ZDEBGtest_instance_serial (SEC): saga log event new_state = N064 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42212025-03-01T00:12:06.655ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 64 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42222025-03-01T00:12:06.660ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 7432 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 7762d833-18f3-48e4-be2a-fa98a619d370 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
42232025-03-01T00:12:06.661ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "7762d833-18f3-48e4-be2a-fa98a619d370", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:05 GMT"} })
42242025-03-01T00:12:06.662ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42252025-03-01T00:12:06.662ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42262025-03-01T00:12:06.662ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
42272025-03-01T00:12:06.665ZDEBGtest_instance_serial (SEC): saga log event new_state = N064 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42282025-03-01T00:12:06.666ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 64 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42292025-03-01T00:12:06.672ZDEBGtest_instance_serial (SEC): saga log event new_state = N065 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42302025-03-01T00:12:06.672ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 65 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42312025-03-01T00:12:06.679ZDEBGtest_instance_serial (SEC): saga log event new_state = N065 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42322025-03-01T00:12:06.680ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("28142d1a-50c9-405a-87cf-281906e8a0a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}) node_id = 65 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42332025-03-01T00:12:06.697ZDEBGtest_instance_serial (SEC): saga log event new_state = N066 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42342025-03-01T00:12:06.697ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 66 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42352025-03-01T00:12:06.703ZDEBGtest_instance_serial (SEC): saga log event new_state = N066 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42362025-03-01T00:12:06.704ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 66 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42372025-03-01T00:12:06.710ZDEBGtest_instance_serial (SEC): saga log event new_state = N067 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42382025-03-01T00:12:06.710ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 67 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42392025-03-01T00:12:06.717ZDEBGtest_instance_serial (SEC): saga log event new_state = N067 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42402025-03-01T00:12:06.718ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 67 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42412025-03-01T00:12:06.723ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42422025-03-01T00:12:06.723ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42432025-03-01T00:12:06.730ZDEBGtest_instance_serial (SEC): saga log event new_state = N068 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42442025-03-01T00:12:06.730ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 68 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42452025-03-01T00:12:06.730ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42462025-03-01T00:12:06.731ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42472025-03-01T00:12:06.731ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42482025-03-01T00:12:06.732ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
42492025-03-01T00:12:06.738ZDEBGtest_instance_serial (SEC): saga log event new_state = N068 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42502025-03-01T00:12:06.749ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 68 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42512025-03-01T00:12:06.753ZDEBGtest_instance_serial (SEC): saga log event new_state = N069 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42522025-03-01T00:12:06.756ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 69 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42532025-03-01T00:12:06.761ZDEBGtest_instance_serial (SEC): saga log event new_state = N069 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42542025-03-01T00:12:06.762ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("fcbb5a77-0400-4dcd-8cd0-800682e53968"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}) node_id = 69 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42552025-03-01T00:12:06.772ZDEBGtest_instance_serial (SEC): saga log event new_state = N070 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42562025-03-01T00:12:06.775ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 70 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42572025-03-01T00:12:06.786ZDEBGtest_instance_serial (SEC): saga log event new_state = N070 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42582025-03-01T00:12:06.786ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 70 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42592025-03-01T00:12:06.792ZDEBGtest_instance_serial (SEC): saga log event new_state = N071 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42602025-03-01T00:12:06.796ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 71 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42612025-03-01T00:12:06.803ZDEBGtest_instance_serial (SEC): saga log event new_state = N071 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42622025-03-01T00:12:06.803ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 71 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42632025-03-01T00:12:06.810ZDEBGtest_instance_serial (SEC): saga log event new_state = N072 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42642025-03-01T00:12:06.810ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 72 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42652025-03-01T00:12:06.816ZDEBGtest_instance_serial (SEC): saga log event new_state = N072 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42662025-03-01T00:12:06.816ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 72 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42672025-03-01T00:12:06.823ZDEBGtest_instance_serial (SEC): saga log event new_state = N073 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42682025-03-01T00:12:06.824ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 73 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42692025-03-01T00:12:06.828ZDEBGtest_instance_serial (SEC): saga log event new_state = N073 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42702025-03-01T00:12:06.829ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("116fcda2-9619-451e-85c0-cd15cb5232d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}) node_id = 73 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42712025-03-01T00:12:06.834ZDEBGtest_instance_serial (SEC): saga log event new_state = N074 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42722025-03-01T00:12:06.834ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 74 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42732025-03-01T00:12:06.844ZDEBGtest_instance_serial (SEC): saga log event new_state = N074 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42742025-03-01T00:12:06.844ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 74 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42752025-03-01T00:12:06.851ZDEBGtest_instance_serial (SEC): saga log event new_state = N075 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42762025-03-01T00:12:06.851ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 75 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42772025-03-01T00:12:06.858ZDEBGtest_instance_serial (SEC): saga log event new_state = N075 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42782025-03-01T00:12:06.858ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 75 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42792025-03-01T00:12:06.866ZDEBGtest_instance_serial (SEC): saga log event new_state = N076 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42802025-03-01T00:12:06.866ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 76 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42812025-03-01T00:12:06.871ZDEBGtest_instance_serial (SEC): saga log event new_state = N076 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42822025-03-01T00:12:06.872ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 76 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42832025-03-01T00:12:06.878ZDEBGtest_instance_serial (SEC): saga log event new_state = N077 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42842025-03-01T00:12:06.878ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 77 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42852025-03-01T00:12:06.884ZDEBGtest_instance_serial (SEC): saga log event new_state = N077 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42862025-03-01T00:12:06.885ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("021b2af9-d20c-4025-b56b-3c727f22cdac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}) node_id = 77 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42872025-03-01T00:12:06.891ZDEBGtest_instance_serial (SEC): saga log event new_state = N078 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42882025-03-01T00:12:06.892ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 78 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42892025-03-01T00:12:06.898ZDEBGtest_instance_serial (SEC): saga log event new_state = N078 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42902025-03-01T00:12:06.898ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 78 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42912025-03-01T00:12:06.903ZDEBGtest_instance_serial (SEC): saga log event new_state = N079 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42922025-03-01T00:12:06.903ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 79 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42932025-03-01T00:12:06.910ZDEBGtest_instance_serial (SEC): saga log event new_state = N079 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42942025-03-01T00:12:06.910ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 79 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42952025-03-01T00:12:06.919ZDEBGtest_instance_serial (SEC): saga log event new_state = N080 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42962025-03-01T00:12:06.919ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 80 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42972025-03-01T00:12:06.926ZDEBGtest_instance_serial (SEC): saga log event new_state = N080 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
42982025-03-01T00:12:06.927ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 80 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
42992025-03-01T00:12:06.935ZDEBGtest_instance_serial (SEC): saga log event new_state = N081 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43002025-03-01T00:12:06.935ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 81 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43012025-03-01T00:12:06.939ZDEBGtest_instance_serial (SEC): saga log event new_state = N081 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43022025-03-01T00:12:06.940ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("dd018198-e27f-4fdf-b1b5-750dd1dc2325"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}) node_id = 81 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43032025-03-01T00:12:06.949ZDEBGtest_instance_serial (SEC): saga log event new_state = N082 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43042025-03-01T00:12:06.950ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 82 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43052025-03-01T00:12:06.957ZDEBGtest_instance_serial (SEC): saga log event new_state = N082 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43062025-03-01T00:12:06.957ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 82 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43072025-03-01T00:12:06.965ZDEBGtest_instance_serial (SEC): saga log event new_state = N083 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43082025-03-01T00:12:06.966ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 83 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43092025-03-01T00:12:06.973ZDEBGtest_instance_serial (SEC): saga log event new_state = N083 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43102025-03-01T00:12:06.973ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 83 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43112025-03-01T00:12:06.980ZDEBGtest_instance_serial (SEC): saga log event new_state = N084 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43122025-03-01T00:12:06.980ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 84 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43132025-03-01T00:12:06.986ZDEBGtest_instance_serial (SEC): saga log event new_state = N084 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43142025-03-01T00:12:06.987ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 84 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43152025-03-01T00:12:06.997ZDEBGtest_instance_serial (SEC): saga log event new_state = N085 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43162025-03-01T00:12:06.997ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 85 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43172025-03-01T00:12:07.005ZDEBGtest_instance_serial (SEC): saga log event new_state = N085 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43182025-03-01T00:12:07.007ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ee2c70fc-74c0-4ad1-9ca0-ba3a60da88e1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}) node_id = 85 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43192025-03-01T00:12:07.013ZDEBGtest_instance_serial (SEC): saga log event new_state = N086 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43202025-03-01T00:12:07.015ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 86 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43212025-03-01T00:12:07.019ZDEBGtest_instance_serial (SEC): saga log event new_state = N086 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43222025-03-01T00:12:07.019ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 86 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43232025-03-01T00:12:07.026ZDEBGtest_instance_serial (SEC): saga log event new_state = N087 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43242025-03-01T00:12:07.027ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 87 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43252025-03-01T00:12:07.032ZDEBGtest_instance_serial (SEC): saga log event new_state = N087 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43262025-03-01T00:12:07.033ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 87 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43272025-03-01T00:12:07.037ZDEBGtest_instance_serial (SEC): saga log event new_state = N088 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43282025-03-01T00:12:07.037ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 88 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43292025-03-01T00:12:07.045ZDEBGtest_instance_serial (SEC): saga log event new_state = N088 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43302025-03-01T00:12:07.045ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 88 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43312025-03-01T00:12:07.052ZDEBGtest_instance_serial (SEC): saga log event new_state = N089 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43322025-03-01T00:12:07.052ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 89 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43332025-03-01T00:12:07.061ZDEBGtest_instance_serial (SEC): saga log event new_state = N089 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43342025-03-01T00:12:07.062ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("a53f16eb-8696-4223-a1bf-d7144301adc2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}) node_id = 89 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43352025-03-01T00:12:07.066ZDEBGtest_instance_serial (SEC): saga log event new_state = N090 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43362025-03-01T00:12:07.066ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 90 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43372025-03-01T00:12:07.071ZDEBGtest_instance_serial (SEC): saga log event new_state = N090 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43382025-03-01T00:12:07.071ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 90 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43392025-03-01T00:12:07.078ZDEBGtest_instance_serial (SEC): saga log event new_state = N091 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43402025-03-01T00:12:07.078ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 91 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43412025-03-01T00:12:07.084ZDEBGtest_instance_serial (SEC): saga log event new_state = N091 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43422025-03-01T00:12:07.085ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 91 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43432025-03-01T00:12:07.089ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
43442025-03-01T00:12:07.089ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
43452025-03-01T00:12:07.090ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
43462025-03-01T00:12:07.091ZDEBGtest_instance_serial (SEC): saga log event new_state = N092 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43472025-03-01T00:12:07.092ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 92 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43482025-03-01T00:12:07.103ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
43492025-03-01T00:12:07.103ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
43502025-03-01T00:12:07.103ZDEBGtest_instance_serial (SEC): saga log event new_state = N092 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43512025-03-01T00:12:07.105ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 92 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43522025-03-01T00:12:07.110ZDEBGtest_instance_serial (SEC): saga log event new_state = N093 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43532025-03-01T00:12:07.110ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 93 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43542025-03-01T00:12:07.110ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
43552025-03-01T00:12:07.110ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
43562025-03-01T00:12:07.116ZDEBGtest_instance_serial (SEC): saga log event new_state = N093 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43572025-03-01T00:12:07.116ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("7bd314a0-9744-42df-a6f1-21eb9f32f77c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}) node_id = 93 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43582025-03-01T00:12:07.123ZDEBGtest_instance_serial (SEC): saga log event new_state = N094 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43592025-03-01T00:12:07.123ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 94 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43602025-03-01T00:12:07.130ZDEBGtest_instance_serial (SEC): saga log event new_state = N094 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43612025-03-01T00:12:07.131ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 94 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43622025-03-01T00:12:07.135ZDEBGtest_instance_serial (SEC): saga log event new_state = N095 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43632025-03-01T00:12:07.136ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 95 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43642025-03-01T00:12:07.142ZDEBGtest_instance_serial (SEC): saga log event new_state = N095 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43652025-03-01T00:12:07.150ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 95 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43662025-03-01T00:12:07.155ZDEBGtest_instance_serial (SEC): saga log event new_state = N096 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43672025-03-01T00:12:07.156ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 96 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43682025-03-01T00:12:07.160ZDEBGtest_instance_serial (SEC): saga log event new_state = N096 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43692025-03-01T00:12:07.161ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 96 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43702025-03-01T00:12:07.170ZDEBGtest_instance_serial (SEC): saga log event new_state = N097 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43712025-03-01T00:12:07.171ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 97 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43722025-03-01T00:12:07.180ZDEBGtest_instance_serial (SEC): saga log event new_state = N097 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43732025-03-01T00:12:07.181ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6d688e5b-6143-4083-ad8f-19dc3c93a5c3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}) node_id = 97 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43742025-03-01T00:12:07.202ZDEBGtest_instance_serial (SEC): saga log event new_state = N098 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43752025-03-01T00:12:07.202ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 98 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43762025-03-01T00:12:07.208ZDEBGtest_instance_serial (SEC): saga log event new_state = N098 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43772025-03-01T00:12:07.209ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 98 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43782025-03-01T00:12:07.217ZDEBGtest_instance_serial (SEC): saga log event new_state = N099 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43792025-03-01T00:12:07.217ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 99 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43802025-03-01T00:12:07.229ZDEBGtest_instance_serial (SEC): saga log event new_state = N099 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43812025-03-01T00:12:07.230ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 99 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43822025-03-01T00:12:07.245ZDEBGtest_instance_serial (SEC): saga log event new_state = N100 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43832025-03-01T00:12:07.245ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 100 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43842025-03-01T00:12:07.256ZDEBGtest_instance_serial (SEC): saga log event new_state = N100 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43852025-03-01T00:12:07.256ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 100 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43862025-03-01T00:12:07.266ZDEBGtest_instance_serial (SEC): saga log event new_state = N101 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43872025-03-01T00:12:07.266ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 101 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43882025-03-01T00:12:07.275ZDEBGtest_instance_serial (SEC): saga log event new_state = N101 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43892025-03-01T00:12:07.276ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2d4f855a-29c1-4ed3-81c7-621a1b6bc715"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}) node_id = 101 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43902025-03-01T00:12:07.282ZDEBGtest_instance_serial (SEC): saga log event new_state = N102 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43912025-03-01T00:12:07.282ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 102 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43922025-03-01T00:12:07.288ZDEBGtest_instance_serial (SEC): saga log event new_state = N102 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43932025-03-01T00:12:07.288ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 102 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43942025-03-01T00:12:07.297ZDEBGtest_instance_serial (SEC): saga log event new_state = N103 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43952025-03-01T00:12:07.297ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 103 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43962025-03-01T00:12:07.303ZDEBGtest_instance_serial (SEC): saga log event new_state = N103 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43972025-03-01T00:12:07.304ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 103 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
43982025-03-01T00:12:07.311ZDEBGtest_instance_serial (SEC): saga log event new_state = N104 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
43992025-03-01T00:12:07.311ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 104 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44002025-03-01T00:12:07.319ZDEBGtest_instance_serial (SEC): saga log event new_state = N104 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44012025-03-01T00:12:07.319ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 104 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44022025-03-01T00:12:07.326ZDEBGtest_instance_serial (SEC): saga log event new_state = N105 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44032025-03-01T00:12:07.326ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 105 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44042025-03-01T00:12:07.334ZDEBGtest_instance_serial (SEC): saga log event new_state = N105 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44052025-03-01T00:12:07.335ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db8a9bc1-068c-494a-9f2b-5518e5ae79bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}) node_id = 105 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44062025-03-01T00:12:07.342ZDEBGtest_instance_serial (SEC): saga log event new_state = N106 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44072025-03-01T00:12:07.342ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 106 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44082025-03-01T00:12:07.351ZDEBGtest_instance_serial (SEC): saga log event new_state = N106 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44092025-03-01T00:12:07.352ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 106 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44102025-03-01T00:12:07.359ZDEBGtest_instance_serial (SEC): saga log event new_state = N107 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44112025-03-01T00:12:07.359ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 107 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44122025-03-01T00:12:07.370ZDEBGtest_instance_serial (SEC): saga log event new_state = N107 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44132025-03-01T00:12:07.371ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 107 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44142025-03-01T00:12:07.376ZDEBGtest_instance_serial (SEC): saga log event new_state = N108 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44152025-03-01T00:12:07.378ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 108 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44162025-03-01T00:12:07.383ZDEBGtest_instance_serial (SEC): saga log event new_state = N108 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44172025-03-01T00:12:07.385ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 108 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44182025-03-01T00:12:07.390ZDEBGtest_instance_serial (SEC): saga log event new_state = N109 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44192025-03-01T00:12:07.390ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 109 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44202025-03-01T00:12:07.396ZDEBGtest_instance_serial (SEC): saga log event new_state = N109 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44212025-03-01T00:12:07.396ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ce478a4a-7217-4d49-aea8-6fc8e4d932b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}) node_id = 109 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44222025-03-01T00:12:07.405ZDEBGtest_instance_serial (SEC): saga log event new_state = N110 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44232025-03-01T00:12:07.406ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 110 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44242025-03-01T00:12:07.414ZDEBGtest_instance_serial (SEC): saga log event new_state = N110 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44252025-03-01T00:12:07.414ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 110 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44262025-03-01T00:12:07.420ZDEBGtest_instance_serial (SEC): saga log event new_state = N111 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44272025-03-01T00:12:07.420ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 111 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44282025-03-01T00:12:07.429ZDEBGtest_instance_serial (SEC): saga log event new_state = N111 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44292025-03-01T00:12:07.429ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 111 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44302025-03-01T00:12:07.447ZDEBGtest_instance_serial (SEC): saga log event new_state = N112 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44312025-03-01T00:12:07.449ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 112 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44322025-03-01T00:12:07.457ZDEBGtest_instance_serial (SEC): saga log event new_state = N112 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44332025-03-01T00:12:07.457ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 112 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44342025-03-01T00:12:07.465ZDEBGtest_instance_serial (SEC): saga log event new_state = N113 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44352025-03-01T00:12:07.466ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 113 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44362025-03-01T00:12:07.473ZDEBGtest_instance_serial (SEC): saga log event new_state = N113 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44372025-03-01T00:12:07.475ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("04de440b-d151-4381-a60c-2a42594057e0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}) node_id = 113 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44382025-03-01T00:12:07.481ZDEBGtest_instance_serial (SEC): saga log event new_state = N114 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44392025-03-01T00:12:07.481ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 114 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44402025-03-01T00:12:07.488ZDEBGtest_instance_serial (SEC): saga log event new_state = N114 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44412025-03-01T00:12:07.490ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 114 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44422025-03-01T00:12:07.494ZDEBGtest_instance_serial (SEC): saga log event new_state = N115 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44432025-03-01T00:12:07.494ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 115 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44442025-03-01T00:12:07.506ZDEBGtest_instance_serial (SEC): saga log event new_state = N115 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44452025-03-01T00:12:07.506ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 115 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44462025-03-01T00:12:07.516ZDEBGtest_instance_serial (SEC): saga log event new_state = N116 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44472025-03-01T00:12:07.516ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 116 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44482025-03-01T00:12:07.522ZDEBGtest_instance_serial (SEC): saga log event new_state = N116 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44492025-03-01T00:12:07.524ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 116 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44502025-03-01T00:12:07.530ZDEBGtest_instance_serial (SEC): saga log event new_state = N117 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44512025-03-01T00:12:07.530ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 117 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44522025-03-01T00:12:07.535ZDEBGtest_instance_serial (SEC): saga log event new_state = N117 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44532025-03-01T00:12:07.535ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b5e310f4-7b22-4cc0-88c9-d9a05c10fe98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}) node_id = 117 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44542025-03-01T00:12:07.540ZDEBGtest_instance_serial (SEC): saga log event new_state = N118 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44552025-03-01T00:12:07.541ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 118 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44562025-03-01T00:12:07.551ZDEBGtest_instance_serial (SEC): saga log event new_state = N118 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44572025-03-01T00:12:07.553ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 118 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44582025-03-01T00:12:07.557ZDEBGtest_instance_serial (SEC): saga log event new_state = N119 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44592025-03-01T00:12:07.558ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 119 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44602025-03-01T00:12:07.563ZDEBGtest_instance_serial (SEC): saga log event new_state = N119 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44612025-03-01T00:12:07.564ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 119 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44622025-03-01T00:12:07.570ZDEBGtest_instance_serial (SEC): saga log event new_state = N120 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44632025-03-01T00:12:07.570ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 120 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44642025-03-01T00:12:07.575ZDEBGtest_instance_serial (SEC): saga log event new_state = N120 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44652025-03-01T00:12:07.575ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 120 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44662025-03-01T00:12:07.581ZDEBGtest_instance_serial (SEC): saga log event new_state = N121 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44672025-03-01T00:12:07.581ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 121 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44682025-03-01T00:12:07.586ZDEBGtest_instance_serial (SEC): saga log event new_state = N121 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44692025-03-01T00:12:07.587ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6c368183-f470-470d-9773-9297438e6eb0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}) node_id = 121 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44702025-03-01T00:12:07.592ZDEBGtest_instance_serial (SEC): saga log event new_state = N122 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44712025-03-01T00:12:07.593ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 122 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44722025-03-01T00:12:07.598ZDEBGtest_instance_serial (SEC): saga log event new_state = N122 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44732025-03-01T00:12:07.598ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 122 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44742025-03-01T00:12:07.605ZDEBGtest_instance_serial (SEC): saga log event new_state = N123 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44752025-03-01T00:12:07.607ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 123 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44762025-03-01T00:12:07.614ZDEBGtest_instance_serial (SEC): saga log event new_state = N123 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44772025-03-01T00:12:07.614ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 123 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44782025-03-01T00:12:07.622ZDEBGtest_instance_serial (SEC): saga log event new_state = N124 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44792025-03-01T00:12:07.622ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 124 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44802025-03-01T00:12:07.628ZDEBGtest_instance_serial (SEC): saga log event new_state = N124 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44812025-03-01T00:12:07.628ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 124 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44822025-03-01T00:12:07.635ZDEBGtest_instance_serial (SEC): saga log event new_state = N125 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44832025-03-01T00:12:07.636ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 125 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44842025-03-01T00:12:07.643ZDEBGtest_instance_serial (SEC): saga log event new_state = N125 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44852025-03-01T00:12:07.643ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("5339ee19-a230-4fe0-88d0-10387e054c21"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}) node_id = 125 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44862025-03-01T00:12:07.658ZDEBGtest_instance_serial (SEC): saga log event new_state = N126 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44872025-03-01T00:12:07.659ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 126 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44882025-03-01T00:12:07.670ZDEBGtest_instance_serial (SEC): saga log event new_state = N126 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44892025-03-01T00:12:07.671ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 126 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44902025-03-01T00:12:07.675ZDEBGtest_instance_serial (SEC): saga log event new_state = N127 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44912025-03-01T00:12:07.675ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 127 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44922025-03-01T00:12:07.681ZDEBGtest_instance_serial (SEC): saga log event new_state = N127 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44932025-03-01T00:12:07.682ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 127 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44942025-03-01T00:12:07.688ZDEBGtest_instance_serial (SEC): saga log event new_state = N128 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44952025-03-01T00:12:07.688ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 128 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44962025-03-01T00:12:07.697ZDEBGtest_instance_serial (SEC): saga log event new_state = N128 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44972025-03-01T00:12:07.697ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 128 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
44982025-03-01T00:12:07.703ZDEBGtest_instance_serial (SEC): saga log event new_state = N129 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
44992025-03-01T00:12:07.704ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 129 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45002025-03-01T00:12:07.711ZDEBGtest_instance_serial (SEC): saga log event new_state = N129 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45012025-03-01T00:12:07.711ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("e54c4404-8313-4730-a619-56ccba15eaa3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}) node_id = 129 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45022025-03-01T00:12:07.719ZDEBGtest_instance_serial (SEC): saga log event new_state = N130 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45032025-03-01T00:12:07.720ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 130 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45042025-03-01T00:12:07.723ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
45052025-03-01T00:12:07.723ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
45062025-03-01T00:12:07.731ZDEBGtest_instance_serial (SEC): saga log event new_state = N130 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45072025-03-01T00:12:07.731ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 130 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45082025-03-01T00:12:07.731ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
45092025-03-01T00:12:07.732ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
45102025-03-01T00:12:07.732ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
45112025-03-01T00:12:07.732ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
45122025-03-01T00:12:07.745ZDEBGtest_instance_serial (SEC): saga log event new_state = N131 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45132025-03-01T00:12:07.745ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 131 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45142025-03-01T00:12:07.755ZDEBGtest_instance_serial (SEC): saga log event new_state = N131 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45152025-03-01T00:12:07.755ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 131 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45162025-03-01T00:12:07.760ZDEBGtest_instance_serial (SEC): saga log event new_state = N132 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45172025-03-01T00:12:07.760ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 132 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45182025-03-01T00:12:07.769ZDEBGtest_instance_serial (SEC): saga log event new_state = N132 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45192025-03-01T00:12:07.770ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 132 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45202025-03-01T00:12:07.784ZDEBGtest_instance_serial (SEC): saga log event new_state = N133 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45212025-03-01T00:12:07.784ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 133 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45222025-03-01T00:12:07.791ZDEBGtest_instance_serial (SEC): saga log event new_state = N133 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45232025-03-01T00:12:07.791ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ff10edd3-e1e3-42c5-96d0-da00460de303"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}) node_id = 133 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45242025-03-01T00:12:07.796ZDEBGtest_instance_serial (SEC): saga log event new_state = N134 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45252025-03-01T00:12:07.796ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 134 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45262025-03-01T00:12:07.806ZDEBGtest_instance_serial (SEC): saga log event new_state = N134 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45272025-03-01T00:12:07.806ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 134 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45282025-03-01T00:12:07.810ZDEBGtest_instance_serial (SEC): saga log event new_state = N135 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45292025-03-01T00:12:07.810ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 135 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45302025-03-01T00:12:07.818ZDEBGtest_instance_serial (SEC): saga log event new_state = N135 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45312025-03-01T00:12:07.818ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 135 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45322025-03-01T00:12:07.830ZDEBGtest_instance_serial (SEC): saga log event new_state = N136 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45332025-03-01T00:12:07.830ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 136 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45342025-03-01T00:12:07.837ZDEBGtest_instance_serial (SEC): saga log event new_state = N136 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45352025-03-01T00:12:07.838ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 136 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45362025-03-01T00:12:07.843ZDEBGtest_instance_serial (SEC): saga log event new_state = N137 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45372025-03-01T00:12:07.843ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 137 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45382025-03-01T00:12:07.848ZDEBGtest_instance_serial (SEC): saga log event new_state = N137 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45392025-03-01T00:12:07.849ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("bb1bd592-b4ef-4fdb-8f92-82d665d8b3cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}) node_id = 137 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45402025-03-01T00:12:07.864ZDEBGtest_instance_serial (SEC): saga log event new_state = N138 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45412025-03-01T00:12:07.864ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 138 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45422025-03-01T00:12:07.875ZDEBGtest_instance_serial (SEC): saga log event new_state = N138 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45432025-03-01T00:12:07.877ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 138 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45442025-03-01T00:12:07.887ZDEBGtest_instance_serial (SEC): saga log event new_state = N139 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45452025-03-01T00:12:07.887ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 139 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45462025-03-01T00:12:07.892ZDEBGtest_instance_serial (SEC): saga log event new_state = N139 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45472025-03-01T00:12:07.893ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 139 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45482025-03-01T00:12:07.898ZDEBGtest_instance_serial (SEC): saga log event new_state = N140 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45492025-03-01T00:12:07.899ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 140 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45502025-03-01T00:12:07.906ZDEBGtest_instance_serial (SEC): saga log event new_state = N140 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45512025-03-01T00:12:07.906ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 140 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45522025-03-01T00:12:07.913ZDEBGtest_instance_serial (SEC): saga log event new_state = N141 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45532025-03-01T00:12:07.913ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 141 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45542025-03-01T00:12:07.921ZDEBGtest_instance_serial (SEC): saga log event new_state = N141 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45552025-03-01T00:12:07.921ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6a56b8d3-8d97-4b74-854b-b65f102adf42"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}) node_id = 141 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45562025-03-01T00:12:07.932ZDEBGtest_instance_serial (SEC): saga log event new_state = N142 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45572025-03-01T00:12:07.933ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 142 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45582025-03-01T00:12:07.940ZDEBGtest_instance_serial (SEC): saga log event new_state = N142 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45592025-03-01T00:12:07.940ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 142 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45602025-03-01T00:12:07.945ZDEBGtest_instance_serial (SEC): saga log event new_state = N143 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45612025-03-01T00:12:07.946ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 143 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45622025-03-01T00:12:07.953ZDEBGtest_instance_serial (SEC): saga log event new_state = N143 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45632025-03-01T00:12:07.953ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 143 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45642025-03-01T00:12:07.959ZDEBGtest_instance_serial (SEC): saga log event new_state = N144 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45652025-03-01T00:12:07.960ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 144 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45662025-03-01T00:12:07.965ZDEBGtest_instance_serial (SEC): saga log event new_state = N144 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45672025-03-01T00:12:07.966ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 144 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45682025-03-01T00:12:07.971ZDEBGtest_instance_serial (SEC): saga log event new_state = N145 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45692025-03-01T00:12:07.972ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 145 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45702025-03-01T00:12:07.977ZDEBGtest_instance_serial (SEC): saga log event new_state = N145 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45712025-03-01T00:12:07.977ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("31373b71-4861-45ae-a277-796a47c2ff8e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}) node_id = 145 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45722025-03-01T00:12:07.992ZDEBGtest_instance_serial (SEC): saga log event new_state = N146 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45732025-03-01T00:12:07.996ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 146 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45742025-03-01T00:12:08.000ZDEBGtest_instance_serial (SEC): saga log event new_state = N146 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45752025-03-01T00:12:08.000ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 146 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45762025-03-01T00:12:08.010ZDEBGtest_instance_serial (SEC): saga log event new_state = N147 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45772025-03-01T00:12:08.010ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 147 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45782025-03-01T00:12:08.017ZDEBGtest_instance_serial (SEC): saga log event new_state = N147 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45792025-03-01T00:12:08.017ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 147 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45802025-03-01T00:12:08.023ZDEBGtest_instance_serial (SEC): saga log event new_state = N148 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45812025-03-01T00:12:08.023ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 148 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45822025-03-01T00:12:08.029ZDEBGtest_instance_serial (SEC): saga log event new_state = N148 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45832025-03-01T00:12:08.029ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 148 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45842025-03-01T00:12:08.036ZDEBGtest_instance_serial (SEC): saga log event new_state = N149 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45852025-03-01T00:12:08.036ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 149 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45862025-03-01T00:12:08.042ZDEBGtest_instance_serial (SEC): saga log event new_state = N149 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45872025-03-01T00:12:08.042ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9cf6840e-c2e0-4bc1-9e8d-5fb01bb5237e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}) node_id = 149 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45882025-03-01T00:12:08.051ZDEBGtest_instance_serial (SEC): saga log event new_state = N150 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45892025-03-01T00:12:08.052ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 150 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45902025-03-01T00:12:08.057ZDEBGtest_instance_serial (SEC): saga log event new_state = N150 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45912025-03-01T00:12:08.058ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 150 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45922025-03-01T00:12:08.065ZDEBGtest_instance_serial (SEC): saga log event new_state = N151 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45932025-03-01T00:12:08.065ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 151 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45942025-03-01T00:12:08.072ZDEBGtest_instance_serial (SEC): saga log event new_state = N151 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45952025-03-01T00:12:08.072ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 151 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45962025-03-01T00:12:08.078ZDEBGtest_instance_serial (SEC): saga log event new_state = N152 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45972025-03-01T00:12:08.078ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 152 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
45982025-03-01T00:12:08.087ZDEBGtest_instance_serial (SEC): saga log event new_state = N152 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
45992025-03-01T00:12:08.087ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 152 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46002025-03-01T00:12:08.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46012025-03-01T00:12:08.092ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
46022025-03-01T00:12:08.092ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
46032025-03-01T00:12:08.093ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
46042025-03-01T00:12:08.093ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
46052025-03-01T00:12:08.097ZDEBGtest_instance_serial (SEC): saga log event new_state = N153 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46062025-03-01T00:12:08.097ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 153 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46072025-03-01T00:12:08.103ZDEBGtest_instance_serial (SEC): saga log event new_state = N153 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46082025-03-01T00:12:08.104ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("88536628-2ebe-474a-a565-621210192073"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}) node_id = 153 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46092025-03-01T00:12:08.110ZDEBGtest_instance_serial (SEC): saga log event new_state = N154 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46102025-03-01T00:12:08.110ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 154 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46112025-03-01T00:12:08.116ZDEBGtest_instance_serial (SEC): saga log event new_state = N154 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46122025-03-01T00:12:08.117ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 154 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46132025-03-01T00:12:08.123ZDEBGtest_instance_serial (SEC): saga log event new_state = N155 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46142025-03-01T00:12:08.123ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 155 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46152025-03-01T00:12:08.131ZDEBGtest_instance_serial (SEC): saga log event new_state = N155 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46162025-03-01T00:12:08.132ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 155 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46172025-03-01T00:12:08.132ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
46182025-03-01T00:12:08.132ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
46192025-03-01T00:12:08.138ZDEBGtest_instance_serial (SEC): saga log event new_state = N156 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46202025-03-01T00:12:08.138ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 156 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46212025-03-01T00:12:08.144ZDEBGtest_instance_serial (SEC): saga log event new_state = N156 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46222025-03-01T00:12:08.144ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 156 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46232025-03-01T00:12:08.150ZDEBGtest_instance_serial (SEC): saga log event new_state = N157 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46242025-03-01T00:12:08.150ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 157 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46252025-03-01T00:12:08.158ZDEBGtest_instance_serial (SEC): saga log event new_state = N157 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46262025-03-01T00:12:08.159ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db49e4b5-28ff-4433-93db-cc1f95534e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}) node_id = 157 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46272025-03-01T00:12:08.172ZDEBGtest_instance_serial (SEC): saga log event new_state = N158 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46282025-03-01T00:12:08.172ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 158 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46292025-03-01T00:12:08.180ZDEBGtest_instance_serial (SEC): saga log event new_state = N158 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46302025-03-01T00:12:08.180ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 158 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46312025-03-01T00:12:08.192ZDEBGtest_instance_serial (SEC): saga log event new_state = N159 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46322025-03-01T00:12:08.193ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 159 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46332025-03-01T00:12:08.204ZDEBGtest_instance_serial (SEC): saga log event new_state = N159 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46342025-03-01T00:12:08.204ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 159 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46352025-03-01T00:12:08.209ZDEBGtest_instance_serial (SEC): saga log event new_state = N160 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46362025-03-01T00:12:08.209ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 160 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46372025-03-01T00:12:08.214ZDEBGtest_instance_serial (SEC): saga log event new_state = N160 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46382025-03-01T00:12:08.214ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 160 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46392025-03-01T00:12:08.225ZDEBGtest_instance_serial (SEC): saga log event new_state = N161 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46402025-03-01T00:12:08.225ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 161 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46412025-03-01T00:12:08.231ZDEBGtest_instance_serial (SEC): saga log event new_state = N161 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46422025-03-01T00:12:08.231ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("314e2ae8-e8b3-4f5d-bfce-203fe0acd91f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}) node_id = 161 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46432025-03-01T00:12:08.242ZDEBGtest_instance_serial (SEC): saga log event new_state = N162 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46442025-03-01T00:12:08.242ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 162 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46452025-03-01T00:12:08.247ZDEBGtest_instance_serial (SEC): saga log event new_state = N162 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46462025-03-01T00:12:08.248ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 162 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46472025-03-01T00:12:08.254ZDEBGtest_instance_serial (SEC): saga log event new_state = N163 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46482025-03-01T00:12:08.254ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 163 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46492025-03-01T00:12:08.265ZDEBGtest_instance_serial (SEC): saga log event new_state = N163 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46502025-03-01T00:12:08.265ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 163 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46512025-03-01T00:12:08.269ZDEBGtest_instance_serial (SEC): saga log event new_state = N164 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46522025-03-01T00:12:08.269ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 164 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46532025-03-01T00:12:08.274ZDEBGtest_instance_serial (SEC): saga log event new_state = N164 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46542025-03-01T00:12:08.274ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 164 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46552025-03-01T00:12:08.281ZDEBGtest_instance_serial (SEC): saga log event new_state = N165 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46562025-03-01T00:12:08.281ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 165 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46572025-03-01T00:12:08.287ZDEBGtest_instance_serial (SEC): saga log event new_state = N165 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46582025-03-01T00:12:08.289ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 165 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46592025-03-01T00:12:08.293ZDEBGtest_instance_serial (SEC): saga log event new_state = N166 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46602025-03-01T00:12:08.294ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 166 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46612025-03-01T00:12:08.315ZDEBGtest_instance_serial (SEC): saga log event new_state = N166 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46622025-03-01T00:12:08.316ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 166 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46632025-03-01T00:12:08.324ZDEBGtest_instance_serial (SEC): saga log event new_state = N168 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46642025-03-01T00:12:08.325ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 168 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46652025-03-01T00:12:08.331ZDEBGtest_instance_serial (SEC): saga log event new_state = N168 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46662025-03-01T00:12:08.331ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 168 saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46672025-03-01T00:12:08.336ZINFOtest_instance_serial (SEC): update for saga cached state new_state = Done saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46682025-03-01T00:12:08.337ZINFOtest_instance_serial (SecStore): updating state new_state = done saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99
46692025-03-01T00:12:08.360ZINFOtest_instance_serial (SEC): saga finished result = success saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
46702025-03-01T00:12:08.360ZINFOtest_instance_serial (SagaExecutor): saga finished saga_id = 86b57918-e438-4efd-8e0f-9470c5899c99 saga_name = instance-create saga_result = SagaResult { saga_id: 86b57918-e438-4efd-8e0f-9470c5899c99, saga_log: SagaLog { saga_id: 86b57918-e438-4efd-8e0f-9470c5899c99, unwinding: false, events: [N167 started, N167 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N020 started, N020 succeeded, N021 started, N021 succeeded, N022 started, N022 succeeded, N023 started, N023 succeeded, N024 started, N024 succeeded, N025 started, N025 succeeded, N026 started, N026 succeeded, N027 started, N027 succeeded, N028 started, N028 succeeded, N029 started, N029 succeeded, N030 started, N030 succeeded, N031 started, N031 succeeded, N032 started, N032 succeeded, N033 started, N033 succeeded, N034 started, N034 succeeded, N035 started, N035 succeeded, N036 started, N036 succeeded, N037 started, N037 succeeded, N038 started, N038 succeeded, N039 started, N039 succeeded, N040 started, N040 succeeded, N041 started, N041 succeeded, N042 started, N042 succeeded, N043 started, N043 succeeded, N044 started, N044 succeeded, N045 started, N045 succeeded, N046 started, N046 succeeded, N047 started, N047 succeeded, N048 started, N048 succeeded, N049 started, N049 succeeded, N050 started, N050 succeeded, N051 started, N051 succeeded, N052 started, N052 succeeded, N053 started, N053 succeeded, N054 started, N054 succeeded, N055 started, N055 succeeded, N056 started, N056 succeeded, N057 started, N057 succeeded, N058 started, N058 succeeded, N059 started, N059 succeeded, N060 started, N060 succeeded, N061 started, N061 succeeded, N062 started, N062 succeeded, N063 started, N063 succeeded, N064 started, N064 succeeded, N065 started, N065 succeeded, N066 started, N066 succeeded, N067 started, N067 succeeded, N068 started, N068 succeeded, N069 started, N069 succeeded, N070 started, N070 succeeded, N071 started, N071 succeeded, N072 started, N072 succeeded, N073 started, N073 succeeded, N074 started, N074 succeeded, N075 started, N075 succeeded, N076 started, N076 succeeded, N077 started, N077 succeeded, N078 started, N078 succeeded, N079 started, N079 succeeded, N080 started, N080 succeeded, N081 started, N081 succeeded, N082 started, N082 succeeded, N083 started, N083 succeeded, N084 started, N084 succeeded, N085 started, N085 succeeded, N086 started, N086 succeeded, N087 started, N087 succeeded, N088 started, N088 succeeded, N089 started, N089 succeeded, N090 started, N090 succeeded, N091 started, N091 succeeded, N092 started, N092 succeeded, N093 started, N093 succeeded, N094 started, N094 succeeded, N095 started, N095 succeeded, N096 started, N096 succeeded, N097 started, N097 succeeded, N098 started, N098 succeeded, N099 started, N099 succeeded, N100 started, N100 succeeded, N101 started, N101 succeeded, N102 started, N102 succeeded, N103 started, N103 succeeded, N104 started, N104 succeeded, N105 started, N105 succeeded, N106 started, N106 succeeded, N107 started, N107 succeeded, N108 started, N108 succeeded, N109 started, N109 succeeded, N110 started, N110 succeeded, N111 started, N111 succeeded, N112 started, N112 succeeded, N113 started, N113 succeeded, N114 started, N114 succeeded, N115 started, N115 succeeded, N116 started, N116 succeeded, N117 started, N117 succeeded, N118 started, N118 succeeded, N119 started, N119 succeeded, N120 started, N120 succeeded, N121 started, N121 succeeded, N122 started, N122 succeeded, N123 started, N123 succeeded, N124 started, N124 succeeded, N125 started, N125 succeeded, N126 started, N126 succeeded, N127 started, N127 succeeded, N128 started, N128 succeeded, N129 started, N129 succeeded, N130 started, N130 succeeded, N131 started, N131 succeeded, N132 started, N132 succeeded, N133 started, N133 succeeded, N134 started, N134 succeeded, N135 started, N135 succeeded, N136 started, N136 succeeded, N137 started, N137 succeeded, N138 started, N138 succeeded, N139 started, N139 succeeded, N140 started, N140 succeeded, N141 started, N141 succeeded, N142 started, N142 succeeded, N143 started, N143 succeeded, N144 started, N144 succeeded, N145 started, N145 succeeded, N146 started, N146 succeeded, N147 started, N147 succeeded, N148 started, N148 succeeded, N149 started, N149 succeeded, N150 started, N150 succeeded, N151 started, N151 succeeded, N152 started, N152 succeeded, N153 started, N153 succeeded, N154 started, N154 succeeded, N155 started, N155 succeeded, N156 started, N156 succeeded, N157 started, N157 succeeded, N158 started, N158 succeeded, N159 started, N159 succeeded, N160 started, N160 succeeded, N161 started, N161 succeeded, N162 started, N162 succeeded, N163 started, N163 succeeded, N164 started, N164 succeeded, N165 started, N165 succeeded, N166 started, N166 succeeded, N168 started, N168 succeeded], node_status: {0: Succeeded(String("e905f321-f9bd-462a-8fa7-37fb1aa527bc")), 1: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}), 2: Succeeded(Null), 3: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("056457f4-5d07-4fcc-acca-6b33df144cf3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 4: Succeeded(Null), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("aa5578bc-bd1c-40b7-8751-3ba56fd7e26c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("0e7e6f1a-009c-4b85-a39b-e8ddab724ddc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Null), 15: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("340f2089-53e6-46c7-aee3-7dfd049a336d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 16: Succeeded(Null), 17: Succeeded(Null), 18: Succeeded(Null), 19: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("65640bb9-0378-45c3-8261-9efb465e65ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 20: Succeeded(Null), 21: Succeeded(Null), 22: Succeeded(Null), 23: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b2c4a53b-e03b-455f-8070-aed5973e69a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 24: Succeeded(Null), 25: Succeeded(Null), 26: Succeeded(Null), 27: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2c3b4b82-e9ba-407f-b947-30f3148b99a5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 28: Succeeded(Null), 29: Succeeded(Null), 30: Succeeded(Null), 31: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("c50ec8b1-472c-4246-bf97-b09a59f176d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 32: Succeeded(Null), 33: Succeeded(Null), 34: Succeeded(Null), 35: Succeeded(String("cb3d1189-9b27-419b-99d8-28973ff330dc")), 36: Succeeded(Null), 37: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("19906e2f-e287-447c-8f85-113248983528"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}), 38: Succeeded(Null), 39: Succeeded(Null), 40: Succeeded(Null), 41: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9801221c-933d-40a9-a329-b622fb853e6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}), 42: Succeeded(Null), 43: Succeeded(Null), 44: Succeeded(Null), 45: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("546c0e0d-28ca-463c-a196-426074b298f4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}), 46: Succeeded(Null), 47: Succeeded(Null), 48: Succeeded(Null), 49: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("13226f0f-e4bf-438e-9d3b-c3490af5028b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}), 50: Succeeded(Null), 51: Succeeded(Null), 52: Succeeded(Null), 53: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("336ec682-af00-4c62-9025-a4232710e3a8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}), 54: Succeeded(Null), 55: Succeeded(Null), 56: Succeeded(Null), 57: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("42287f8f-15cd-4cbf-b4d4-ed6ed6ebcf0a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}), 58: Succeeded(Null), 59: Succeeded(Null), 60: Succeeded(Null), 61: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ecc1b4c6-0c8a-440a-a156-7972fc4dfc54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}), 62: Succeeded(Null), 63: Succeeded(Null), 64: Succeeded(Null), 65: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("28142d1a-50c9-405a-87cf-281906e8a0a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}), 66: Succeeded(Null), 67: Succeeded(Null), 68: Succeeded(Null), 69: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("fcbb5a77-0400-4dcd-8cd0-800682e53968"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}), 70: Succeeded(Null), 71: Succeeded(Null), 72: Succeeded(Null), 73: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("116fcda2-9619-451e-85c0-cd15cb5232d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}), 74: Succeeded(Null), 75: Succeeded(Null), 76: Succeeded(Null), 77: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("021b2af9-d20c-4025-b56b-3c727f22cdac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}), 78: Succeeded(Null), 79: Succeeded(Null), 80: Succeeded(Null), 81: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("dd018198-e27f-4fdf-b1b5-750dd1dc2325"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}), 82: Succeeded(Null), 83: Succeeded(Null), 84: Succeeded(Null), 85: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ee2c70fc-74c0-4ad1-9ca0-ba3a60da88e1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}), 86: Succeeded(Null), 87: Succeeded(Null), 88: Succeeded(Null), 89: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("a53f16eb-8696-4223-a1bf-d7144301adc2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}), 90: Succeeded(Null), 91: Succeeded(Null), 92: Succeeded(Null), 93: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("7bd314a0-9744-42df-a6f1-21eb9f32f77c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}), 94: Succeeded(Null), 95: Succeeded(Null), 96: Succeeded(Null), 97: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6d688e5b-6143-4083-ad8f-19dc3c93a5c3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}), 98: Succeeded(Null), 99: Succeeded(Null), 100: Succeeded(Null), 101: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2d4f855a-29c1-4ed3-81c7-621a1b6bc715"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}), 102: Succeeded(Null), 103: Succeeded(Null), 104: Succeeded(Null), 105: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db8a9bc1-068c-494a-9f2b-5518e5ae79bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}), 106: Succeeded(Null), 107: Succeeded(Null), 108: Succeeded(Null), 109: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ce478a4a-7217-4d49-aea8-6fc8e4d932b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}), 110: Succeeded(Null), 111: Succeeded(Null), 112: Succeeded(Null), 113: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("04de440b-d151-4381-a60c-2a42594057e0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}), 114: Succeeded(Null), 115: Succeeded(Null), 116: Succeeded(Null), 117: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b5e310f4-7b22-4cc0-88c9-d9a05c10fe98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}), 118: Succeeded(Null), 119: Succeeded(Null), 120: Succeeded(Null), 121: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6c368183-f470-470d-9773-9297438e6eb0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}), 122: Succeeded(Null), 123: Succeeded(Null), 124: Succeeded(Null), 125: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("5339ee19-a230-4fe0-88d0-10387e054c21"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}), 126: Succeeded(Null), 127: Succeeded(Null), 128: Succeeded(Null), 129: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("e54c4404-8313-4730-a619-56ccba15eaa3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}), 130: Succeeded(Null), 131: Succeeded(Null), 132: Succeeded(Null), 133: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ff10edd3-e1e3-42c5-96d0-da00460de303"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}), 134: Succeeded(Null), 135: Succeeded(Null), 136: Succeeded(Null), 137: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("bb1bd592-b4ef-4fdb-8f92-82d665d8b3cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}), 138: Succeeded(Null), 139: Succeeded(Null), 140: Succeeded(Null), 141: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6a56b8d3-8d97-4b74-854b-b65f102adf42"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}), 142: Succeeded(Null), 143: Succeeded(Null), 144: Succeeded(Null), 145: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("31373b71-4861-45ae-a277-796a47c2ff8e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}), 146: Succeeded(Null), 147: Succeeded(Null), 148: Succeeded(Null), 149: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9cf6840e-c2e0-4bc1-9e8d-5fb01bb5237e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}), 150: Succeeded(Null), 151: Succeeded(Null), 152: Succeeded(Null), 153: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("88536628-2ebe-474a-a565-621210192073"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}), 154: Succeeded(Null), 155: Succeeded(Null), 156: Succeeded(Null), 157: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db49e4b5-28ff-4433-93db-cc1f95534e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}), 158: Succeeded(Null), 159: Succeeded(Null), 160: Succeeded(Null), 161: Succeeded(Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("314e2ae8-e8b3-4f5d-bfce-203fe0acd91f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}), 162: Succeeded(Null), 163: Succeeded(Null), 164: Succeeded(Null), 165: Succeeded(Null), 166: Succeeded(Null), 167: Succeeded(Null), 168: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"external-ip-0": Null, "external-ip-1": Null, "external-ip-10": Null, "external-ip-11": Null, "external-ip-12": Null, "external-ip-13": Null, "external-ip-14": Null, "external-ip-15": Null, "external-ip-16": Null, "external-ip-17": Null, "external-ip-18": Null, "external-ip-19": Null, "external-ip-2": Null, "external-ip-20": Null, "external-ip-21": Null, "external-ip-22": Null, "external-ip-23": Null, "external-ip-24": Null, "external-ip-25": Null, "external-ip-26": Null, "external-ip-27": Null, "external-ip-28": Null, "external-ip-29": Null, "external-ip-3": Null, "external-ip-30": Null, "external-ip-31": Null, "external-ip-4": Null, "external-ip-5": Null, "external-ip-6": Null, "external-ip-7": Null, "external-ip-8": Null, "external-ip-9": Null, "external_ip0": Null, "external_ip1": Null, "external_ip10": Null, "external_ip11": Null, "external_ip12": Null, "external_ip13": Null, "external_ip14": Null, "external_ip15": Null, "external_ip16": Null, "external_ip17": Null, "external_ip18": Null, "external_ip19": Null, "external_ip2": Null, "external_ip20": Null, "external_ip21": Null, "external_ip22": Null, "external_ip23": Null, "external_ip24": Null, "external_ip25": Null, "external_ip26": Null, "external_ip27": Null, "external_ip28": Null, "external_ip29": Null, "external_ip3": Null, "external_ip30": Null, "external_ip31": Null, "external_ip4": Null, "external_ip5": Null, "external_ip6": Null, "external_ip7": Null, "external_ip8": Null, "external_ip9": Null, "external_ip_params0": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("19906e2f-e287-447c-8f85-113248983528"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "external_ip_params1": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9801221c-933d-40a9-a329-b622fb853e6d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "external_ip_params10": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("021b2af9-d20c-4025-b56b-3c727f22cdac"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(10)}, "external_ip_params11": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("dd018198-e27f-4fdf-b1b5-750dd1dc2325"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(11)}, "external_ip_params12": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ee2c70fc-74c0-4ad1-9ca0-ba3a60da88e1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(12)}, "external_ip_params13": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("a53f16eb-8696-4223-a1bf-d7144301adc2"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(13)}, "external_ip_params14": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("7bd314a0-9744-42df-a6f1-21eb9f32f77c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(14)}, "external_ip_params15": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6d688e5b-6143-4083-ad8f-19dc3c93a5c3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(15)}, "external_ip_params16": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2d4f855a-29c1-4ed3-81c7-621a1b6bc715"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(16)}, "external_ip_params17": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db8a9bc1-068c-494a-9f2b-5518e5ae79bd"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(17)}, "external_ip_params18": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ce478a4a-7217-4d49-aea8-6fc8e4d932b3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(18)}, "external_ip_params19": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("04de440b-d151-4381-a60c-2a42594057e0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(19)}, "external_ip_params2": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("546c0e0d-28ca-463c-a196-426074b298f4"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "external_ip_params20": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b5e310f4-7b22-4cc0-88c9-d9a05c10fe98"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(20)}, "external_ip_params21": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6c368183-f470-470d-9773-9297438e6eb0"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(21)}, "external_ip_params22": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("5339ee19-a230-4fe0-88d0-10387e054c21"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(22)}, "external_ip_params23": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("e54c4404-8313-4730-a619-56ccba15eaa3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(23)}, "external_ip_params24": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ff10edd3-e1e3-42c5-96d0-da00460de303"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(24)}, "external_ip_params25": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("bb1bd592-b4ef-4fdb-8f92-82d665d8b3cb"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(25)}, "external_ip_params26": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("6a56b8d3-8d97-4b74-854b-b65f102adf42"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(26)}, "external_ip_params27": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("31373b71-4861-45ae-a277-796a47c2ff8e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(27)}, "external_ip_params28": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("9cf6840e-c2e0-4bc1-9e8d-5fb01bb5237e"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(28)}, "external_ip_params29": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("88536628-2ebe-474a-a565-621210192073"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(29)}, "external_ip_params3": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("13226f0f-e4bf-438e-9d3b-c3490af5028b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "external_ip_params30": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("db49e4b5-28ff-4433-93db-cc1f95534e1b"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(30)}, "external_ip_params31": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("314e2ae8-e8b3-4f5d-bfce-203fe0acd91f"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(31)}, "external_ip_params4": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("336ec682-af00-4c62-9025-a4232710e3a8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "external_ip_params5": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("42287f8f-15cd-4cbf-b4d4-ed6ed6ebcf0a"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "external_ip_params6": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("ecc1b4c6-0c8a-440a-a156-7972fc4dfc54"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "external_ip_params7": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("28142d1a-50c9-405a-87cf-281906e8a0a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "external_ip_params8": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("fcbb5a77-0400-4dcd-8cd0-800682e53968"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(8)}, "external_ip_params9": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("116fcda2-9619-451e-85c0-cd15cb5232d9"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(9)}, "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "instance_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(1), "migration_id": Null, "nexus_state": String("Creating"), "propolis_id": Null, "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}, "network_interface0": Null, "network_interface1": Null, "network_interface2": Null, "network_interface3": Null, "network_interface4": Null, "network_interface5": Null, "network_interface6": Null, "network_interface7": Null, "network_interface_params0": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("056457f4-5d07-4fcc-acca-6b33df144cf3"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(0)}, "network_interface_params1": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("aa5578bc-bd1c-40b7-8751-3ba56fd7e26c"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(1)}, "network_interface_params2": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("0e7e6f1a-009c-4b85-a39b-e8ddab724ddc"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(2)}, "network_interface_params3": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("340f2089-53e6-46c7-aee3-7dfd049a336d"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(3)}, "network_interface_params4": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("65640bb9-0378-45c3-8261-9efb465e65ae"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(4)}, "network_interface_params5": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("b2c4a53b-e03b-455f-8070-aed5973e69a1"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(5)}, "network_interface_params6": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("2c3b4b82-e9ba-407f-b947-30f3148b99a5"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(6)}, "network_interface_params7": Object {"instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "new_id": String("c50ec8b1-472c-4246-bf97-b09a59f176d8"), "saga_params": Object {"boundary_switches": Array [], "create_params": Object {"auto_restart_policy": Null, "boot_disk": Null, "description": String("instance \\"kris-picks\\""), "disks": Array [], "external_ips": Array [], "hostname": String("the-host"), "memory": Number(1073741824), "name": String("kris-picks"), "ncpus": Number(4), "network_interfaces": Object {"type": String("default")}, "ssh_public_keys": Array [], "start": Bool(true), "user_data": String("I2Nsb3VkLWNvbmZpZwpzeXN0ZW1faW5mbzoKICBkZWZhdWx0X3VzZXI6CiAgICBuYW1lOiBveGlkZQ==")}, "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}}, Object {"mapped_fleet_roles": Object {}}]}}}, "which": Number(7)}, "output": Null, "set_boot_disk": Null, "snat_ip": Null, "snat_ip_id": String("cb3d1189-9b27-419b-99d8-28973ff330dc"), "stopped_instance": Null} }) }
46712025-03-01T00:12:08.367ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
46722025-03-01T00:12:08.368ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
46732025-03-01T00:12:08.368ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
46742025-03-01T00:12:08.368ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
46752025-03-01T00:12:08.369ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
46762025-03-01T00:12:08.369ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
46772025-03-01T00:12:08.369ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
46782025-03-01T00:12:08.369ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
46792025-03-01T00:12:08.369ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
46802025-03-01T00:12:08.369ZTRACtest_instance_serial (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } uri = /v1/instances?project=springfield-squidport
46812025-03-01T00:12:08.369ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances?project=springfield-squidport
46822025-03-01T00:12:08.370ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
46832025-03-01T00:12:08.370ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
46842025-03-01T00:12:08.370ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
46852025-03-01T00:12:08.373ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=springfield-squidport
46862025-03-01T00:12:08.373ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
46872025-03-01T00:12:08.373ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
46882025-03-01T00:12:08.373ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
46892025-03-01T00:12:08.376ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=springfield-squidport
46902025-03-01T00:12:08.376ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
46912025-03-01T00:12:08.376ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
46922025-03-01T00:12:08.376ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
46932025-03-01T00:12:08.383ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=springfield-squidport
46942025-03-01T00:12:08.395ZDEBGtest_instance_serial (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) uri = /v1/instances?project=springfield-squidport
46952025-03-01T00:12:08.395ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } uri = /v1/instances?project=springfield-squidport
46962025-03-01T00:12:08.395ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances?project=springfield-squidport
46972025-03-01T00:12:08.395ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
46982025-03-01T00:12:08.395ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
46992025-03-01T00:12:08.396ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
47002025-03-01T00:12:08.399ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=springfield-squidport
47012025-03-01T00:12:08.399ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
47022025-03-01T00:12:08.400ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
47032025-03-01T00:12:08.400ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
47042025-03-01T00:12:08.403ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=springfield-squidport
47052025-03-01T00:12:08.403ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
47062025-03-01T00:12:08.403ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
47072025-03-01T00:12:08.405ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
47082025-03-01T00:12:08.406ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=springfield-squidport
47092025-03-01T00:12:08.414ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) uri = /v1/instances?project=springfield-squidport
47102025-03-01T00:12:08.414ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
47112025-03-01T00:12:08.414ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
47122025-03-01T00:12:08.415ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
47132025-03-01T00:12:08.421ZINFOtest_instance_serial (SagaExecutor): preparing saga saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start
47142025-03-01T00:12:08.421ZINFOtest_instance_serial (SEC): saga create dag = {"end_node":11,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[10,0,null],[9,11,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"instance_start.generate_propolis_id","label":"GeneratePropolisId","name":"propolis_id"}},{"Action":{"action_name":"instance_start.alloc_server","label":"AllocServer","name":"sled_id"}},{"Action":{"action_name":"instance_start.alloc_propolis_ip","label":"AllocPropolisIp","name":"propolis_ip"}},{"Action":{"action_name":"instance_start.create_vmm_record","label":"CreateVmmRecord","name":"vmm_record"}},{"Action":{"action_name":"instance_start.mark_as_starting","label":"MarkAsStarting","name":"started_record"}},{"Action":{"action_name":"instance_start.dpd_ensure","label":"DpdEnsure","name":"dpd_ensure"}},{"Action":{"action_name":"instance_start.v2p_ensure","label":"V2PEnsure","name":"v2p_ensure"}},{"Action":{"action_name":"instance_start.ensure_registered","label":"EnsureRegistered","name":"ensure_registered"}},{"Action":{"action_name":"instance_start.add_virtual_resources","label":"AddVirtualResources","name":"virtual_resources"}},{"Action":{"action_name":"instance_start.ensure_running","label":"EnsureRunning","name":"ensure_running"}},{"Start":{"params":{"db_instance":{"auto_restart":{"cooldown":null,"policy":null},"boot_disk_id":null,"hostname":"the-host","identity":{"description":"instance \\"kris-picks\\"","id":"e905f321-f9bd-462a-8fa7-37fb1aa527bc","name":"kris-picks","time_created":"2025-03-01T00:12:04.827858Z","time_deleted":null,"time_modified":"2025-03-01T00:12:04.827858Z"},"memory":1073741824,"ncpus":4,"project_id":"66c3eb55-f1ba-4d92-8a3d-904da1aa2a24","runtime_state":{"dst_propolis_id":null,"gen":2,"migration_id":null,"nexus_state":"NoVmm","propolis_id":null,"time_last_auto_restarted":null,"time_updated":"2025-03-01T00:12:04.827858Z"},"updater_gen":1,"updater_id":null,"user_data":[35,99,108,111,117,100,45,99,111,110,102,105,103,10,115,121,115,116,101,109,95,105,110,102,111,58,10,32,32,100,101,102,97,117,108,116,95,117,115,101,114,58,10,32,32,32,32,110,97,109,101,58,32,111,120,105,100,101]},"reason":"AutoStart","serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}}},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"instance-start","start_node":10} saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47152025-03-01T00:12:08.422ZINFOtest_instance_serial (SecStore): creating saga saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start
47162025-03-01T00:12:08.475ZINFOtest_instance_serial (SagaExecutor): starting saga saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start
47172025-03-01T00:12:08.475ZINFOtest_instance_serial (SEC): saga start saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47182025-03-01T00:12:08.475ZDEBGtest_instance_serial (SEC): saga log event new_state = N010 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47192025-03-01T00:12:08.475ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 10 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47202025-03-01T00:12:08.482ZDEBGtest_instance_serial (SEC): saga log event new_state = N010 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47212025-03-01T00:12:08.482ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 10 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47222025-03-01T00:12:08.490ZDEBGtest_instance_serial (SEC): saga log event new_state = N000 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47232025-03-01T00:12:08.491ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 0 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47242025-03-01T00:12:08.499ZDEBGtest_instance_serial (SEC): saga log event new_state = N000 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47252025-03-01T00:12:08.499ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a")) node_id = 0 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47262025-03-01T00:12:08.505ZDEBGtest_instance_serial (SEC): saga log event new_state = N001 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47272025-03-01T00:12:08.505ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 1 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47282025-03-01T00:12:08.512ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
47292025-03-01T00:12:08.513ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
47302025-03-01T00:12:08.513ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
47312025-03-01T00:12:08.552ZINFOtest_instance_serial (InstanceAllocator): found 1 available sled targets sled_ids = [b6d65341-167c-41df-9b5c-41cded99c229]
47322025-03-01T00:12:08.622ZDEBGtest_instance_serial (SEC): saga log event new_state = N001 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47332025-03-01T00:12:08.622ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229")) node_id = 1 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47342025-03-01T00:12:08.629ZDEBGtest_instance_serial (SEC): saga log event new_state = N002 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47352025-03-01T00:12:08.629ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 2 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47362025-03-01T00:12:08.636ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = AllocPropolisIp
47372025-03-01T00:12:08.637ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = AllocPropolisIp
47382025-03-01T00:12:08.637ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = AllocPropolisIp
47392025-03-01T00:12:08.648ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
47402025-03-01T00:12:08.649ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47412025-03-01T00:12:08.649ZDEBGtest_instance_serial (SEC): saga log event new_state = N002 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47422025-03-01T00:12:08.649ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(String("::1:0")) node_id = 2 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47432025-03-01T00:12:08.650ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 6b653a2f-02c0-4c51-b272-67b97004c274 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47442025-03-01T00:12:08.651ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 6b653a2f-02c0-4c51-b272-67b97004c274 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47452025-03-01T00:12:08.651ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 6b653a2f-02c0-4c51-b272-67b97004c274 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47462025-03-01T00:12:08.651ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 6b653a2f-02c0-4c51-b272-67b97004c274 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47472025-03-01T00:12:08.654ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 4520 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 6b653a2f-02c0-4c51-b272-67b97004c274 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
47482025-03-01T00:12:08.655ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "6b653a2f-02c0-4c51-b272-67b97004c274", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:07 GMT"} })
47492025-03-01T00:12:08.655ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47502025-03-01T00:12:08.656ZDEBGtest_instance_serial (SEC): saga log event new_state = N003 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47512025-03-01T00:12:08.656ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 3 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47522025-03-01T00:12:08.656ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 376fc848-e0f9-44dd-883f-49e14a90060f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47532025-03-01T00:12:08.657ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 376fc848-e0f9-44dd-883f-49e14a90060f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47542025-03-01T00:12:08.657ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 376fc848-e0f9-44dd-883f-49e14a90060f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47552025-03-01T00:12:08.657ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 376fc848-e0f9-44dd-883f-49e14a90060f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47562025-03-01T00:12:08.661ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 4962 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 376fc848-e0f9-44dd-883f-49e14a90060f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
47572025-03-01T00:12:08.662ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "376fc848-e0f9-44dd-883f-49e14a90060f", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:07 GMT"} })
47582025-03-01T00:12:08.663ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47592025-03-01T00:12:08.663ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47602025-03-01T00:12:08.663ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
47612025-03-01T00:12:08.663ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = CreateVmmRecord
47622025-03-01T00:12:08.663ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = CreateVmmRecord
47632025-03-01T00:12:08.663ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = CreateVmmRecord
47642025-03-01T00:12:08.722ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47652025-03-01T00:12:08.733ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47662025-03-01T00:12:08.733ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47672025-03-01T00:12:08.733ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47682025-03-01T00:12:08.733ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47692025-03-01T00:12:08.733ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
47702025-03-01T00:12:08.737ZDEBGtest_instance_serial (SEC): saga log event new_state = N003 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47712025-03-01T00:12:08.737ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-01T00:12:08.662752Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}) node_id = 3 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47722025-03-01T00:12:08.746ZDEBGtest_instance_serial (SEC): saga log event new_state = N004 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
47732025-03-01T00:12:08.746ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 4 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
47742025-03-01T00:12:08.764ZINFOtest_instance_serial (SagaExecutor): moving instance to Starting state via saga instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start start_reason = AutoStart
47752025-03-01T00:12:08.764ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47762025-03-01T00:12:08.764ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47772025-03-01T00:12:08.765ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47782025-03-01T00:12:08.768ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47792025-03-01T00:12:08.768ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47802025-03-01T00:12:08.769ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47812025-03-01T00:12:08.771ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47822025-03-01T00:12:08.771ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47832025-03-01T00:12:08.772ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47842025-03-01T00:12:08.773ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47852025-03-01T00:12:08.774ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47862025-03-01T00:12:08.774ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47872025-03-01T00:12:08.774ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47882025-03-01T00:12:08.774ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47892025-03-01T00:12:08.776ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47902025-03-01T00:12:08.777ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47912025-03-01T00:12:08.778ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47922025-03-01T00:12:08.778ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47932025-03-01T00:12:08.782ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47942025-03-01T00:12:08.782ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47952025-03-01T00:12:08.782ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47962025-03-01T00:12:08.783ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47972025-03-01T00:12:08.796ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47982025-03-01T00:12:08.827ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
47992025-03-01T00:12:08.827ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48002025-03-01T00:12:08.827ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48012025-03-01T00:12:08.827ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48022025-03-01T00:12:08.828ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48032025-03-01T00:12:08.828ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48042025-03-01T00:12:08.833ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48052025-03-01T00:12:08.833ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48062025-03-01T00:12:08.834ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48072025-03-01T00:12:08.834ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48082025-03-01T00:12:08.838ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48092025-03-01T00:12:08.838ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48102025-03-01T00:12:08.838ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48112025-03-01T00:12:08.839ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48122025-03-01T00:12:08.843ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48132025-03-01T00:12:08.851ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48142025-03-01T00:12:08.855ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48152025-03-01T00:12:08.855ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48162025-03-01T00:12:08.856ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = MarkAsStarting
48172025-03-01T00:12:08.882ZDEBGtest_instance_serial (SEC): saga log event new_state = N004 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
48182025-03-01T00:12:08.882ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}) node_id = 4 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
48192025-03-01T00:12:08.892ZDEBGtest_instance_serial (SEC): saga log event new_state = N005 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
48202025-03-01T00:12:08.892ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 5 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
48212025-03-01T00:12:08.901ZINFOtest_instance_serial (SagaExecutor): start saga: ensuring instance dpd configuration instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start start_reason = AutoStart
48222025-03-01T00:12:08.901ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
48232025-03-01T00:12:08.901ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
48242025-03-01T00:12:08.902ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
48252025-03-01T00:12:08.909ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
48262025-03-01T00:12:08.910ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
48272025-03-01T00:12:08.910ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
48282025-03-01T00:12:08.910ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
48292025-03-01T00:12:08.910ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
48302025-03-01T00:12:08.913ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
48312025-03-01T00:12:08.921ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
48322025-03-01T00:12:08.922ZINFOtest_instance_serial (nexus): looking up instance's primary network interface instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc
48332025-03-01T00:12:08.922ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48342025-03-01T00:12:08.922ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48352025-03-01T00:12:08.922ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48362025-03-01T00:12:08.926ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48372025-03-01T00:12:08.926ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48382025-03-01T00:12:08.926ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48392025-03-01T00:12:08.928ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48402025-03-01T00:12:08.928ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48412025-03-01T00:12:08.929ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48422025-03-01T00:12:08.931ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48432025-03-01T00:12:08.932ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48442025-03-01T00:12:08.932ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48452025-03-01T00:12:08.932ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48462025-03-01T00:12:08.933ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48472025-03-01T00:12:08.935ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48482025-03-01T00:12:08.937ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48492025-03-01T00:12:08.937ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48502025-03-01T00:12:08.937ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48512025-03-01T00:12:08.941ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48522025-03-01T00:12:08.941ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48532025-03-01T00:12:08.942ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48542025-03-01T00:12:08.942ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48552025-03-01T00:12:08.945ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48562025-03-01T00:12:08.956ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48572025-03-01T00:12:08.957ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48582025-03-01T00:12:08.957ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48592025-03-01T00:12:08.957ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48602025-03-01T00:12:08.957ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48612025-03-01T00:12:08.958ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48622025-03-01T00:12:08.964ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48632025-03-01T00:12:08.965ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48642025-03-01T00:12:08.965ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48652025-03-01T00:12:08.966ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48662025-03-01T00:12:08.969ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48672025-03-01T00:12:08.969ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48682025-03-01T00:12:08.969ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48692025-03-01T00:12:08.970ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48702025-03-01T00:12:08.972ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48712025-03-01T00:12:08.981ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48722025-03-01T00:12:08.981ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48732025-03-01T00:12:08.981ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48742025-03-01T00:12:08.981ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48752025-03-01T00:12:08.990ZINFOtest_instance_serial (nexus): looking up instance's external IPs instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc
48762025-03-01T00:12:08.990ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48772025-03-01T00:12:08.990ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48782025-03-01T00:12:08.990ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48792025-03-01T00:12:08.996ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48802025-03-01T00:12:08.996ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48812025-03-01T00:12:08.997ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = DpdEnsure
48822025-03-01T00:12:09.030ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet
48832025-03-01T00:12:09.030ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
48842025-03-01T00:12:09.030ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
48852025-03-01T00:12:09.030ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
48862025-03-01T00:12:09.031ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
48872025-03-01T00:12:09.032ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
48882025-03-01T00:12:09.035ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Fleet result = Ok(())
48892025-03-01T00:12:09.036ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
48902025-03-01T00:12:09.036ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
48912025-03-01T00:12:09.036ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
48922025-03-01T00:12:09.039ZDEBGtest_instance_serial (SEC): saga log event new_state = N005 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
48932025-03-01T00:12:09.040ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 5 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
48942025-03-01T00:12:09.046ZDEBGtest_instance_serial (SEC): saga log event new_state = N006 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
48952025-03-01T00:12:09.046ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 6 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
48962025-03-01T00:12:09.054ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = v2p_manager iteration = 2 reason = Signaled
48972025-03-01T00:12:09.054ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
48982025-03-01T00:12:09.054ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
48992025-03-01T00:12:09.055ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
49002025-03-01T00:12:09.055ZDEBGtest_instance_serial (SEC): saga log event new_state = N006 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
49012025-03-01T00:12:09.055ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 6 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
49022025-03-01T00:12:09.065ZDEBGtest_instance_serial (SEC): saga log event new_state = N007 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
49032025-03-01T00:12:09.065ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 7 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
49042025-03-01T00:12:09.086ZINFOtest_instance_serial (SagaExecutor): start saga: ensuring instance is registered on sled instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_reason = AutoStart
49052025-03-01T00:12:09.086ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49062025-03-01T00:12:09.086ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49072025-03-01T00:12:09.086ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49082025-03-01T00:12:09.092ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
49092025-03-01T00:12:09.092ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
49102025-03-01T00:12:09.092ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
49112025-03-01T00:12:09.092ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49122025-03-01T00:12:09.092ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49132025-03-01T00:12:09.092ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49142025-03-01T00:12:09.094ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
49152025-03-01T00:12:09.094ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
49162025-03-01T00:12:09.096ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49172025-03-01T00:12:09.096ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49182025-03-01T00:12:09.097ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49192025-03-01T00:12:09.098ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
49202025-03-01T00:12:09.098ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
49212025-03-01T00:12:09.099ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49222025-03-01T00:12:09.099ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49232025-03-01T00:12:09.099ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49242025-03-01T00:12:09.099ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49252025-03-01T00:12:09.101ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49262025-03-01T00:12:09.104ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49272025-03-01T00:12:09.104ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49282025-03-01T00:12:09.104ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49292025-03-01T00:12:09.108ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49302025-03-01T00:12:09.115ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49312025-03-01T00:12:09.116ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49322025-03-01T00:12:09.116ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49332025-03-01T00:12:09.117ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49342025-03-01T00:12:09.123ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49352025-03-01T00:12:09.131ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49362025-03-01T00:12:09.131ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49372025-03-01T00:12:09.131ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49382025-03-01T00:12:09.131ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49392025-03-01T00:12:09.131ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49402025-03-01T00:12:09.133ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49412025-03-01T00:12:09.135ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
49422025-03-01T00:12:09.135ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
49432025-03-01T00:12:09.136ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
49442025-03-01T00:12:09.137ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49452025-03-01T00:12:09.137ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49462025-03-01T00:12:09.137ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49472025-03-01T00:12:09.139ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49482025-03-01T00:12:09.142ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49492025-03-01T00:12:09.143ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49502025-03-01T00:12:09.143ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49512025-03-01T00:12:09.143ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49522025-03-01T00:12:09.147ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49532025-03-01T00:12:09.156ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49542025-03-01T00:12:09.156ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49552025-03-01T00:12:09.157ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49562025-03-01T00:12:09.157ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49572025-03-01T00:12:09.157ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49582025-03-01T00:12:09.157ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49592025-03-01T00:12:09.159ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49602025-03-01T00:12:09.161ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49612025-03-01T00:12:09.161ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49622025-03-01T00:12:09.161ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49632025-03-01T00:12:09.163ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49642025-03-01T00:12:09.163ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49652025-03-01T00:12:09.163ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49662025-03-01T00:12:09.163ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49672025-03-01T00:12:09.166ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49682025-03-01T00:12:09.175ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49692025-03-01T00:12:09.175ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49702025-03-01T00:12:09.175ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49712025-03-01T00:12:09.178ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49722025-03-01T00:12:09.180ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49732025-03-01T00:12:09.180ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49742025-03-01T00:12:09.181ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49752025-03-01T00:12:09.181ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49762025-03-01T00:12:09.181ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49772025-03-01T00:12:09.184ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49782025-03-01T00:12:09.184ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49792025-03-01T00:12:09.184ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49802025-03-01T00:12:09.184ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49812025-03-01T00:12:09.188ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49822025-03-01T00:12:09.188ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49832025-03-01T00:12:09.188ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49842025-03-01T00:12:09.188ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49852025-03-01T00:12:09.191ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49862025-03-01T00:12:09.207ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49872025-03-01T00:12:09.208ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49882025-03-01T00:12:09.208ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49892025-03-01T00:12:09.208ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49902025-03-01T00:12:09.219ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49912025-03-01T00:12:09.219ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49922025-03-01T00:12:09.220ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49932025-03-01T00:12:09.222ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49942025-03-01T00:12:09.222ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49952025-03-01T00:12:09.223ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49962025-03-01T00:12:09.226ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49972025-03-01T00:12:09.226ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49982025-03-01T00:12:09.227ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
49992025-03-01T00:12:09.228ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50002025-03-01T00:12:09.229ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50012025-03-01T00:12:09.229ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50022025-03-01T00:12:09.232ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50032025-03-01T00:12:09.232ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50042025-03-01T00:12:09.232ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50052025-03-01T00:12:09.234ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50062025-03-01T00:12:09.234ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50072025-03-01T00:12:09.234ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50082025-03-01T00:12:09.234ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50092025-03-01T00:12:09.235ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50102025-03-01T00:12:09.250ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50112025-03-01T00:12:09.250ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50122025-03-01T00:12:09.250ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50132025-03-01T00:12:09.252ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50142025-03-01T00:12:09.256ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50152025-03-01T00:12:09.256ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50162025-03-01T00:12:09.256ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50172025-03-01T00:12:09.257ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50182025-03-01T00:12:09.260ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50192025-03-01T00:12:09.271ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50202025-03-01T00:12:09.271ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50212025-03-01T00:12:09.271ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50222025-03-01T00:12:09.271ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50232025-03-01T00:12:09.271ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50242025-03-01T00:12:09.272ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50252025-03-01T00:12:09.272ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
50262025-03-01T00:12:09.273ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
50272025-03-01T00:12:09.273ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
50282025-03-01T00:12:09.273ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
50292025-03-01T00:12:09.273ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
50302025-03-01T00:12:09.276ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50312025-03-01T00:12:09.276ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50322025-03-01T00:12:09.277ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50332025-03-01T00:12:09.278ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50342025-03-01T00:12:09.281ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
50352025-03-01T00:12:09.285ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
50362025-03-01T00:12:09.285ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet
50372025-03-01T00:12:09.285ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
50382025-03-01T00:12:09.285ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
50392025-03-01T00:12:09.285ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
50402025-03-01T00:12:09.285ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
50412025-03-01T00:12:09.288ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50422025-03-01T00:12:09.288ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50432025-03-01T00:12:09.288ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50442025-03-01T00:12:09.288ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50452025-03-01T00:12:09.292ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
50462025-03-01T00:12:09.296ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Fleet result = Ok(())
50472025-03-01T00:12:09.296ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database
50482025-03-01T00:12:09.296ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
50492025-03-01T00:12:09.297ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = v2p_manager resource = Database result = Ok(())
50502025-03-01T00:12:09.298ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50512025-03-01T00:12:09.304ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50522025-03-01T00:12:09.306ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50532025-03-01T00:12:09.306ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50542025-03-01T00:12:09.306ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50552025-03-01T00:12:09.309ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50562025-03-01T00:12:09.309ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50572025-03-01T00:12:09.309ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50582025-03-01T00:12:09.349ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:38105/v2p
50592025-03-01T00:12:09.352ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50042 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
50602025-03-01T00:12:09.355ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = GET remote_addr = [::1]:50042 req_id = 065c77aa-2f87-4b34-87ab-112c80725f9a sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
50612025-03-01T00:12:09.355ZINFOtest_instance_serial (dropshot): request completed latency_us = 173 local_addr = [::1]:38105 method = GET remote_addr = [::1]:50042 req_id = 065c77aa-2f87-4b34-87ab-112c80725f9a response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
50622025-03-01T00:12:09.355ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:38105/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "065c77aa-2f87-4b34-87ab-112c80725f9a", "content-length": "2", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
50632025-03-01T00:12:09.357ZINFOtest_instance_serial (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = sim-b6d65341
50642025-03-01T00:12:09.357ZINFOtest_instance_serial (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = sim-b6d65341
50652025-03-01T00:12:09.357ZINFOtest_instance_serial (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [VirtualNetworkInterfaceHost { physical_host_ip: ::1, virtual_ip: 172.30.0.5, virtual_mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), vni: Vni(10277605) }] sled = sim-b6d65341
50662025-03-01T00:12:09.357ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = Some(Body) method = PUT uri = http://[::1]:38105/v2p
50672025-03-01T00:12:09.357ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50042 req_id = 768b5d71-b050-4bcb-a04e-417b4fc80ec3 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
50682025-03-01T00:12:09.357ZINFOtest_instance_serial (dropshot): request completed latency_us = 263 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50042 req_id = 768b5d71-b050-4bcb-a04e-417b4fc80ec3 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
50692025-03-01T00:12:09.357ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:38105/v2p", status: 204, headers: {"x-request-id": "768b5d71-b050-4bcb-a04e-417b4fc80ec3", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
50702025-03-01T00:12:09.357ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 301.847234ms iteration = 2 status = {}
50712025-03-01T00:12:09.357ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50722025-03-01T00:12:09.357ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50732025-03-01T00:12:09.357ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50742025-03-01T00:12:09.358ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50752025-03-01T00:12:09.360ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50762025-03-01T00:12:09.360ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50772025-03-01T00:12:09.360ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50782025-03-01T00:12:09.360ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50792025-03-01T00:12:09.360ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50802025-03-01T00:12:09.360ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50812025-03-01T00:12:09.361ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50822025-03-01T00:12:09.363ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50832025-03-01T00:12:09.364ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50842025-03-01T00:12:09.364ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50852025-03-01T00:12:09.364ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50862025-03-01T00:12:09.368ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50872025-03-01T00:12:09.368ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50882025-03-01T00:12:09.369ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50892025-03-01T00:12:09.369ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50902025-03-01T00:12:09.371ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50912025-03-01T00:12:09.380ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50922025-03-01T00:12:09.380ZTRACtest_instance_serial (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50932025-03-01T00:12:09.380ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50942025-03-01T00:12:09.380ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50952025-03-01T00:12:09.380ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50962025-03-01T00:12:09.382ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50972025-03-01T00:12:09.389ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50982025-03-01T00:12:09.391ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
50992025-03-01T00:12:09.391ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51002025-03-01T00:12:09.391ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51012025-03-01T00:12:09.396ZTRACtest_instance_serial (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51022025-03-01T00:12:09.396ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51032025-03-01T00:12:09.396ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51042025-03-01T00:12:09.396ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51052025-03-01T00:12:09.401ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51062025-03-01T00:12:09.409ZDEBGtest_instance_serial (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ByName("default") } result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51072025-03-01T00:12:09.410ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51082025-03-01T00:12:09.410ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51092025-03-01T00:12:09.411ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51102025-03-01T00:12:09.416ZDEBGtest_instance_serial (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {Name("default"): [NetworkInterface { id: 056457f4-5d07-4fcc-acca-6b33df144cf3, kind: Instance { id: e905f321-f9bd-462a-8fa7-37fb1aa527bc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(10277605), primary: true, slot: 0, transit_ips: [] }]}
51112025-03-01T00:12:09.416ZDEBGtest_instance_serial (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 056457f4-5d07-4fcc-acca-6b33df144cf3, kind: Instance { id: e905f321-f9bd-462a-8fa7-37fb1aa527bc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(10277605), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: Some([Vpc(Vni(10277605))]), filter_ports: None, filter_protocols: None, priority: 65534, status: Enabled, targets: [NetworkInterface { id: 056457f4-5d07-4fcc-acca-6b33df144cf3, kind: Instance { id: e905f321-f9bd-462a-8fa7-37fb1aa527bc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(10277605), primary: true, slot: 0, transit_ips: [] }] }, ResolvedVpcFirewallRule { action: Allow, direction: Inbound, filter_hosts: None, filter_ports: Some([L4PortRange("22")]), filter_protocols: Some([Tcp]), priority: 65534, status: Enabled, targets: [NetworkInterface { id: 056457f4-5d07-4fcc-acca-6b33df144cf3, kind: Instance { id: e905f321-f9bd-462a-8fa7-37fb1aa527bc }, name: Name("net0"), ip: 172.30.0.5, mac: MacAddr(MacAddr6([168, 64, 37, 240, 0, 0])), subnet: V4(Ipv4Net { addr: 172.30.0.0, width: 22 }), vni: Vni(10277605), primary: true, slot: 0, transit_ips: [] }] }]
51122025-03-01T00:12:09.417ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51132025-03-01T00:12:09.417ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51142025-03-01T00:12:09.418ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51152025-03-01T00:12:09.430ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
51162025-03-01T00:12:09.430ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
51172025-03-01T00:12:09.430ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
51182025-03-01T00:12:09.432ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
51192025-03-01T00:12:09.433ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
51202025-03-01T00:12:09.433ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
51212025-03-01T00:12:09.433ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
51222025-03-01T00:12:09.433ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
51232025-03-01T00:12:09.435ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
51242025-03-01T00:12:09.441ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
51252025-03-01T00:12:09.527ZDEBGtest_instance_serial (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
51262025-03-01T00:12:09.530ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50044 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
51272025-03-01T00:12:09.531ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50044 req_id = 41b91d6d-4390-4805-bcff-650c602e0bbb sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
51282025-03-01T00:12:09.531ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:36473 remote_addr = [::1]:49988
51292025-03-01T00:12:09.531ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:36473 method = PUT remote_addr = [::1]:49988 req_id = 20b2d1b1-e1ba-43b4-ae71-c74c20ac27e2 uri = /instance
51302025-03-01T00:12:09.531ZINFOtest_instance_serial (dropshot): request completed latency_us = 740 local_addr = [::1]:36473 method = PUT remote_addr = [::1]:49988 req_id = 20b2d1b1-e1ba-43b4-ae71-c74c20ac27e2 response_code = 201 uri = /instance
51312025-03-01T00:12:09.531ZINFOtest_instance_serial (SledAgent): created id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a initial_state = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None } kind = instances server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
51322025-03-01T00:12:09.532ZINFOtest_instance_serial (dropshot): request completed latency_us = 3535 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50044 req_id = 41b91d6d-4390-4805-bcff-650c602e0bbb response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
51332025-03-01T00:12:09.532ZDEBGtest_instance_serial (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a", status: 200, headers: {"content-type": "application/json", "x-request-id": "41b91d6d-4390-4805-bcff-650c602e0bbb", "content-length": "131", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
51342025-03-01T00:12:09.535ZINFOtest_instance_serial (SagaExecutor): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }
51352025-03-01T00:12:09.535ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51362025-03-01T00:12:09.535ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51372025-03-01T00:12:09.536ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = EnsureRegistered
51382025-03-01T00:12:09.604ZDEBGtest_instance_serial (SEC): saga log event new_state = N007 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51392025-03-01T00:12:09.604ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-01T00:12:09.526791825Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}) node_id = 7 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
51402025-03-01T00:12:09.616ZDEBGtest_instance_serial (SEC): saga log event new_state = N008 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51412025-03-01T00:12:09.616ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 8 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
51422025-03-01T00:12:09.628ZTRACtest_instance_serial (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = AddVirtualResources
51432025-03-01T00:12:09.628ZDEBGtest_instance_serial (SagaExecutor): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true roles = RoleSet { roles: {} } saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = AddVirtualResources
51442025-03-01T00:12:09.630ZDEBGtest_instance_serial (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true resource = Database result = Ok(()) saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_node = AddVirtualResources
51452025-03-01T00:12:09.685ZDEBGtest_instance_serial (SEC): saga log event new_state = N008 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51462025-03-01T00:12:09.685ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 8 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
51472025-03-01T00:12:09.693ZDEBGtest_instance_serial (SEC): saga log event new_state = N009 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51482025-03-01T00:12:09.694ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 9 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
51492025-03-01T00:12:09.701ZINFOtest_instance_serial (SagaExecutor): start saga: ensuring instance is running instance_id = e905f321-f9bd-462a-8fa7-37fb1aa527bc saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start sled_id = b6d65341-167c-41df-9b5c-41cded99c229 start_reason = AutoStart
51502025-03-01T00:12:09.701ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
51512025-03-01T00:12:09.702ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
51522025-03-01T00:12:09.702ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
51532025-03-01T00:12:09.704ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
51542025-03-01T00:12:09.705ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
51552025-03-01T00:12:09.705ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
51562025-03-01T00:12:09.705ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
51572025-03-01T00:12:09.706ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
51582025-03-01T00:12:09.712ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
51592025-03-01T00:12:09.716ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
51602025-03-01T00:12:09.772ZDEBGtest_instance_serial (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
51612025-03-01T00:12:09.775ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50046 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
51622025-03-01T00:12:09.775ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
51632025-03-01T00:12:09.779ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
51642025-03-01T00:12:09.780ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50046 req_id = 8153f4ab-b22e-43aa-ab81-1af7f65d9b4b sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
51652025-03-01T00:12:09.783ZINFOtest_instance_serial (dropshot): request completed latency_us = 3306 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50046 req_id = 8153f4ab-b22e-43aa-ab81-1af7f65d9b4b response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
51662025-03-01T00:12:09.789ZDEBGtest_instance_serial (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "8153f4ab-b22e-43aa-ab81-1af7f65d9b4b", "content-length": "24", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
51672025-03-01T00:12:09.790ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
51682025-03-01T00:12:09.792ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
51692025-03-01T00:12:09.792ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
51702025-03-01T00:12:09.792ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
51712025-03-01T00:12:09.792ZDEBGtest_instance_serial (SEC): saga log event new_state = N009 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51722025-03-01T00:12:09.793ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
51732025-03-01T00:12:09.804ZDEBGtest_instance_serial (SEC): saga log event new_state = N011 started sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51742025-03-01T00:12:09.804ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Started node_id = 11 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
51752025-03-01T00:12:09.817ZDEBGtest_instance_serial (SEC): saga log event new_state = N011 succeeded sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51762025-03-01T00:12:09.817ZDEBGtest_instance_serial (SecStore): recording saga event event_type = Succeeded(Null) node_id = 11 saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
51772025-03-01T00:12:09.823ZINFOtest_instance_serial (SEC): update for saga cached state new_state = Done saga_id = 2501e814-0781-452f-ae67-33af9237ae1b sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51782025-03-01T00:12:09.823ZINFOtest_instance_serial (SecStore): updating state new_state = done saga_id = 2501e814-0781-452f-ae67-33af9237ae1b
51792025-03-01T00:12:09.839ZINFOtest_instance_serial (SEC): saga finished result = success saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start sec_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
51802025-03-01T00:12:09.841ZINFOtest_instance_serial (SagaExecutor): saga finished saga_id = 2501e814-0781-452f-ae67-33af9237ae1b saga_name = instance-start saga_result = SagaResult { saga_id: 2501e814-0781-452f-ae67-33af9237ae1b, saga_log: SagaLog { saga_id: 2501e814-0781-452f-ae67-33af9237ae1b, unwinding: false, events: [N010 started, N010 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N011 started, N011 succeeded], node_status: {0: Succeeded(String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a")), 1: Succeeded(String("b6d65341-167c-41df-9b5c-41cded99c229")), 2: Succeeded(String("::1:0")), 3: Succeeded(Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-01T00:12:08.662752Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}), 4: Succeeded(Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}), 5: Succeeded(Null), 6: Succeeded(Null), 7: Succeeded(Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-01T00:12:09.526791825Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}), 8: Succeeded(Null), 9: Succeeded(Null), 10: Succeeded(Null), 11: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"dpd_ensure": Null, "ensure_registered": Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(2), "state": String("Starting"), "time_state_updated": String("2025-03-01T00:12:09.526791825Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}, "ensure_running": Null, "propolis_id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "propolis_ip": String("::1:0"), "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "started_record": Object {"auto_restart": Object {"cooldown": Null, "policy": Null}, "boot_disk_id": Null, "hostname": String("the-host"), "identity": Object {"description": String("instance \\"kris-picks\\""), "id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "name": String("kris-picks"), "time_created": String("2025-03-01T00:12:04.827858Z"), "time_deleted": Null, "time_modified": String("2025-03-01T00:12:04.827858Z")}, "memory": Number(1073741824), "ncpus": Number(4), "project_id": String("66c3eb55-f1ba-4d92-8a3d-904da1aa2a24"), "runtime_state": Object {"dst_propolis_id": Null, "gen": Number(3), "migration_id": Null, "nexus_state": String("Vmm"), "propolis_id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "time_last_auto_restarted": Null, "time_updated": String("2025-03-01T00:12:04.827858Z")}, "updater_gen": Number(1), "updater_id": Null, "user_data": Array [Number(35), Number(99), Number(108), Number(111), Number(117), Number(100), Number(45), Number(99), Number(111), Number(110), Number(102), Number(105), Number(103), Number(10), Number(115), Number(121), Number(115), Number(116), Number(101), Number(109), Number(95), Number(105), Number(110), Number(102), Number(111), Number(58), Number(10), Number(32), Number(32), Number(100), Number(101), Number(102), Number(97), Number(117), Number(108), Number(116), Number(95), Number(117), Number(115), Number(101), Number(114), Number(58), Number(10), Number(32), Number(32), Number(32), Number(32), Number(110), Number(97), Number(109), Number(101), Number(58), Number(32), Number(111), Number(120), Number(105), Number(100), Number(101)]}, "v2p_ensure": Null, "virtual_resources": Null, "vmm_record": Object {"id": String("f740b115-3538-4eb5-ab0f-8a0893e1ff8a"), "instance_id": String("e905f321-f9bd-462a-8fa7-37fb1aa527bc"), "propolis_ip": String("::1:0/128"), "propolis_port": Number(12400), "runtime": Object {"gen": Number(1), "state": String("Creating"), "time_state_updated": String("2025-03-01T00:12:08.662752Z")}, "sled_id": String("b6d65341-167c-41df-9b5c-41cded99c229"), "time_created": String("2025-03-01T00:12:08.662752Z"), "time_deleted": Null}} }) }
51812025-03-01T00:12:09.842ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } uri = /v1/instances?project=springfield-squidport
51822025-03-01T00:12:09.842ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances?project=springfield-squidport
51832025-03-01T00:12:09.842ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
51842025-03-01T00:12:09.842ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
51852025-03-01T00:12:09.842ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
51862025-03-01T00:12:09.844ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=springfield-squidport
51872025-03-01T00:12:09.844ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
51882025-03-01T00:12:09.844ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
51892025-03-01T00:12:09.844ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
51902025-03-01T00:12:09.850ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=springfield-squidport
51912025-03-01T00:12:09.850ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
51922025-03-01T00:12:09.850ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
51932025-03-01T00:12:09.850ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
51942025-03-01T00:12:09.854ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=springfield-squidport
51952025-03-01T00:12:09.865ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) uri = /v1/instances?project=springfield-squidport
51962025-03-01T00:12:09.865ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
51972025-03-01T00:12:09.866ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
51982025-03-01T00:12:09.866ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
51992025-03-01T00:12:09.874ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52002025-03-01T00:12:09.875ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52012025-03-01T00:12:09.875ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52022025-03-01T00:12:09.875ZDEBGtest_instance_serial (BackgroundTasks): activating background_task = vpc_route_manager iteration = 2 reason = Signaled
52032025-03-01T00:12:09.875ZINFOtest_instance_serial (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
52042025-03-01T00:12:09.875ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
52052025-03-01T00:12:09.875ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
52062025-03-01T00:12:09.875ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
52072025-03-01T00:12:09.875ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
52082025-03-01T00:12:09.876ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
52092025-03-01T00:12:09.881ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52102025-03-01T00:12:09.881ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52112025-03-01T00:12:09.881ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52122025-03-01T00:12:09.885ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
52132025-03-01T00:12:09.890ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
52142025-03-01T00:12:09.890ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet
52152025-03-01T00:12:09.890ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
52162025-03-01T00:12:09.890ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
52172025-03-01T00:12:09.891ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
52182025-03-01T00:12:09.891ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
52192025-03-01T00:12:09.893ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52202025-03-01T00:12:09.893ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52212025-03-01T00:12:09.894ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52222025-03-01T00:12:09.898ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
52232025-03-01T00:12:09.902ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
52242025-03-01T00:12:09.902ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
52252025-03-01T00:12:09.902ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
52262025-03-01T00:12:09.903ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
52272025-03-01T00:12:09.905ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } uri = /v1/instances?project=springfield-squidport
52282025-03-01T00:12:09.905ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances?project=springfield-squidport
52292025-03-01T00:12:09.905ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52302025-03-01T00:12:09.905ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52312025-03-01T00:12:09.906ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52322025-03-01T00:12:09.950ZINFOtest_instance_serial (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
52332025-03-01T00:12:09.951ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:38105/vpc-routes
52342025-03-01T00:12:09.951ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50050 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
52352025-03-01T00:12:09.952ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = GET remote_addr = [::1]:50050 req_id = c6546af1-422f-431e-b1b3-bb7804cd86d1 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
52362025-03-01T00:12:09.952ZINFOtest_instance_serial (dropshot): request completed latency_us = 376 local_addr = [::1]:38105 method = GET remote_addr = [::1]:50050 req_id = c6546af1-422f-431e-b1b3-bb7804cd86d1 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
52372025-03-01T00:12:09.953ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:38105/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "c6546af1-422f-431e-b1b3-bb7804cd86d1", "content-length": "154", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
52382025-03-01T00:12:09.953ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
52392025-03-01T00:12:09.953ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
52402025-03-01T00:12:09.955ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
52412025-03-01T00:12:09.955ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=springfield-squidport
52422025-03-01T00:12:09.955ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52432025-03-01T00:12:09.955ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52442025-03-01T00:12:09.956ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52452025-03-01T00:12:09.974ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=springfield-squidport
52462025-03-01T00:12:09.976ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52472025-03-01T00:12:09.978ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52482025-03-01T00:12:09.979ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52492025-03-01T00:12:09.987ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=springfield-squidport
52502025-03-01T00:12:09.995ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) uri = /v1/instances?project=springfield-squidport
52512025-03-01T00:12:09.996ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } uri = /v1/instances?project=springfield-squidport
52522025-03-01T00:12:09.996ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances?project=springfield-squidport
52532025-03-01T00:12:09.996ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52542025-03-01T00:12:09.996ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52552025-03-01T00:12:09.996ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52562025-03-01T00:12:10.006ZINFOtest_instance_serial (BackgroundTasks): computed internet gateway mappings for sled assocs = {056457f4-5d07-4fcc-acca-6b33df144cf3: {10.0.0.0: {0a0c9f59-6a31-43b0-969f-131b36ea3043}}} background_task = vpc_route_manager sled = sim-b6d65341
52572025-03-01T00:12:10.006ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:38105/eip-gateways
52582025-03-01T00:12:10.007ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances?project=springfield-squidport
52592025-03-01T00:12:10.007ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52602025-03-01T00:12:10.007ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52612025-03-01T00:12:10.008ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52622025-03-01T00:12:10.011ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50050 req_id = f050647c-b0c3-442b-810c-d7e306f5d362 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
52632025-03-01T00:12:10.013ZINFOtest_instance_serial (dropshot): request completed latency_us = 343 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50050 req_id = f050647c-b0c3-442b-810c-d7e306f5d362 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
52642025-03-01T00:12:10.013ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances?project=springfield-squidport
52652025-03-01T00:12:10.013ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52662025-03-01T00:12:10.013ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52672025-03-01T00:12:10.013ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52682025-03-01T00:12:10.016ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:38105/eip-gateways", status: 204, headers: {"x-request-id": "f050647c-b0c3-442b-810c-d7e306f5d362", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} })
52692025-03-01T00:12:10.016ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
52702025-03-01T00:12:10.016ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
52712025-03-01T00:12:10.017ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
52722025-03-01T00:12:10.017ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances?project=springfield-squidport
52732025-03-01T00:12:10.025ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(()) uri = /v1/instances?project=springfield-squidport
52742025-03-01T00:12:10.025ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database uri = /v1/instances?project=springfield-squidport
52752025-03-01T00:12:10.025ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa roles = RoleSet { roles: {} } uri = /v1/instances?project=springfield-squidport
52762025-03-01T00:12:10.026ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa resource = Database result = Ok(()) uri = /v1/instances?project=springfield-squidport
52772025-03-01T00:12:10.030ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
52782025-03-01T00:12:10.030ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
52792025-03-01T00:12:10.030ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
52802025-03-01T00:12:10.033ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 5431854 local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = fad21761-d7c4-4c18-8f74-1c857d0a7caa response_code = 201 uri = /v1/instances?project=springfield-squidport
52812025-03-01T00:12:10.034ZINFOtest_instance_serial (external client test context): client received response status = 201
52822025-03-01T00:12:10.034ZINFOtest_instance_serial (nexus): registering Oso class class = Action
52832025-03-01T00:12:10.035ZINFOtest_instance_serial (nexus): registering Oso class class = AnyActor
52842025-03-01T00:12:10.035ZINFOtest_instance_serial (nexus): registering Oso class class = AuthenticatedActor
52852025-03-01T00:12:10.035ZINFOtest_instance_serial (nexus): registering Oso class class = BlueprintConfig
52862025-03-01T00:12:10.036ZINFOtest_instance_serial (nexus): registering Oso class class = Database
52872025-03-01T00:12:10.036ZINFOtest_instance_serial (nexus): registering Oso class class = DnsConfig
52882025-03-01T00:12:10.036ZINFOtest_instance_serial (nexus): registering Oso class class = Fleet
52892025-03-01T00:12:10.036ZINFOtest_instance_serial (nexus): registering Oso class class = Inventory
52902025-03-01T00:12:10.036ZINFOtest_instance_serial (nexus): registering Oso class class = IpPoolList
52912025-03-01T00:12:10.036ZINFOtest_instance_serial (nexus): registering Oso class class = ConsoleSessionList
52922025-03-01T00:12:10.036ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAuthRequestList
52932025-03-01T00:12:10.036ZINFOtest_instance_serial (nexus): registering Oso class class = SiloCertificateList
52942025-03-01T00:12:10.037ZINFOtest_instance_serial (nexus): registering Oso class class = SiloIdentityProviderList
52952025-03-01T00:12:10.037ZINFOtest_instance_serial (nexus): registering Oso class class = SiloUserList
52962025-03-01T00:12:10.037ZINFOtest_instance_serial (nexus): registering Oso class class = Project
52972025-03-01T00:12:10.037ZINFOtest_instance_serial (nexus): registering Oso class class = Disk
52982025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = Snapshot
52992025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = ProjectImage
53002025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = Instance
53012025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = IpPool
53022025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = InstanceNetworkInterface
53032025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = Vpc
53042025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = VpcRouter
53052025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGateway
53062025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGatewayIpPool
53072025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGatewayIpAddress
53082025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = RouterRoute
53092025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = VpcSubnet
53102025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = FloatingIp
53112025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = Image
53122025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = SiloImage
53132025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = AddressLot
53142025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = Blueprint
53152025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = LoopbackAddress
53162025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = Certificate
53172025-03-01T00:12:10.038ZINFOtest_instance_serial (nexus): registering Oso class class = ConsoleSession
53182025-03-01T00:12:10.039ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAuthRequest
53192025-03-01T00:12:10.039ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAccessToken
53202025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = PhysicalDisk
53212025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = Rack
53222025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = RoleBuiltin
53232025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = SshKey
53242025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = Silo
53252025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = SiloUser
53262025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = SiloGroup
53272025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = SupportBundle
53282025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = IdentityProvider
53292025-03-01T00:12:10.040ZINFOtest_instance_serial (nexus): registering Oso class class = SamlIdentityProvider
53302025-03-01T00:12:10.041ZINFOtest_instance_serial (nexus): registering Oso class class = Sled
53312025-03-01T00:12:10.041ZINFOtest_instance_serial (nexus): registering Oso class class = TufRepo
53322025-03-01T00:12:10.041ZINFOtest_instance_serial (nexus): registering Oso class class = TufArtifact
53332025-03-01T00:12:10.041ZINFOtest_instance_serial (nexus): registering Oso class class = Zpool
53342025-03-01T00:12:10.041ZINFOtest_instance_serial (nexus): registering Oso class class = Service
53352025-03-01T00:12:10.041ZINFOtest_instance_serial (nexus): registering Oso class class = UserBuiltin
53362025-03-01T00:12:10.041ZINFOtest_instance_serial (nexus): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
53372025-03-01T00:12:10.070ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
53382025-03-01T00:12:10.070ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
53392025-03-01T00:12:10.071ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
53402025-03-01T00:12:10.075ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
53412025-03-01T00:12:10.075ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
53422025-03-01T00:12:10.076ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
53432025-03-01T00:12:10.078ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
53442025-03-01T00:12:10.079ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
53452025-03-01T00:12:10.079ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
53462025-03-01T00:12:10.081ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
53472025-03-01T00:12:10.083ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
53482025-03-01T00:12:10.083ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
53492025-03-01T00:12:10.083ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
53502025-03-01T00:12:10.083ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
53512025-03-01T00:12:10.083ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
53522025-03-01T00:12:10.085ZTRACtest_instance_serial (nexus): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
53532025-03-01T00:12:10.085ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
53542025-03-01T00:12:10.085ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
53552025-03-01T00:12:10.085ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
53562025-03-01T00:12:10.086ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
53572025-03-01T00:12:10.086ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
53582025-03-01T00:12:10.086ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
53592025-03-01T00:12:10.088ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
53602025-03-01T00:12:10.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
53612025-03-01T00:12:10.090ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
53622025-03-01T00:12:10.094ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
53632025-03-01T00:12:10.095ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
53642025-03-01T00:12:10.097ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
53652025-03-01T00:12:10.097ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
53662025-03-01T00:12:10.097ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
53672025-03-01T00:12:10.097ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
53682025-03-01T00:12:10.097ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
53692025-03-01T00:12:10.099ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
53702025-03-01T00:12:10.099ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
53712025-03-01T00:12:10.100ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
53722025-03-01T00:12:10.101ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
53732025-03-01T00:12:10.101ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
53742025-03-01T00:12:10.102ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
53752025-03-01T00:12:10.102ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
53762025-03-01T00:12:10.103ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
53772025-03-01T00:12:10.103ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
53782025-03-01T00:12:10.105ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
53792025-03-01T00:12:10.106ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
53802025-03-01T00:12:10.108ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
53812025-03-01T00:12:10.108ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
53822025-03-01T00:12:10.108ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
53832025-03-01T00:12:10.108ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
53842025-03-01T00:12:10.108ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
53852025-03-01T00:12:10.109ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
53862025-03-01T00:12:10.111ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
53872025-03-01T00:12:10.112ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
53882025-03-01T00:12:10.112ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
53892025-03-01T00:12:10.112ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
53902025-03-01T00:12:10.112ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
53912025-03-01T00:12:10.121ZDEBGtest_instance_serial (nexus): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(())
53922025-03-01T00:12:10.121ZTRACtest_instance_serial (nexus): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
53932025-03-01T00:12:10.121ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
53942025-03-01T00:12:10.121ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
53952025-03-01T00:12:10.121ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
53962025-03-01T00:12:10.121ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
53972025-03-01T00:12:10.123ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
53982025-03-01T00:12:10.123ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
53992025-03-01T00:12:10.123ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54002025-03-01T00:12:10.123ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54012025-03-01T00:12:10.125ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
54022025-03-01T00:12:10.125ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
54032025-03-01T00:12:10.126ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
54042025-03-01T00:12:10.128ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
54052025-03-01T00:12:10.128ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
54062025-03-01T00:12:10.138ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) } result = Ok(())
54072025-03-01T00:12:10.138ZTRACtest_instance_serial (BackgroundTasks): successful lookup of siloed resource "VpcRouter" using built-in user background_task = vpc_route_manager
54082025-03-01T00:12:10.138ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) }
54092025-03-01T00:12:10.138ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
54102025-03-01T00:12:10.138ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54112025-03-01T00:12:10.138ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54122025-03-01T00:12:10.139ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54132025-03-01T00:12:10.142ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
54142025-03-01T00:12:10.142ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
54152025-03-01T00:12:10.142ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
54162025-03-01T00:12:10.143ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
54172025-03-01T00:12:10.144ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
54182025-03-01T00:12:10.144ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54192025-03-01T00:12:10.145ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54202025-03-01T00:12:10.146ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54212025-03-01T00:12:10.148ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
54222025-03-01T00:12:10.158ZDEBGtest_instance_serial (nexus): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(())
54232025-03-01T00:12:10.159ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
54242025-03-01T00:12:10.159ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
54252025-03-01T00:12:10.159ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
54262025-03-01T00:12:10.160ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
54272025-03-01T00:12:10.161ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54282025-03-01T00:12:10.161ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54292025-03-01T00:12:10.161ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54302025-03-01T00:12:10.162ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
54312025-03-01T00:12:10.172ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 62f2baeb-6247-44a9-9a7e-7024222a2eee, lookup_type: ById(62f2baeb-6247-44a9-9a7e-7024222a2eee) } result = Ok(())
54322025-03-01T00:12:10.172ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54332025-03-01T00:12:10.173ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54342025-03-01T00:12:10.173ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54352025-03-01T00:12:10.174ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
54362025-03-01T00:12:10.174ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
54372025-03-01T00:12:10.174ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
54382025-03-01T00:12:10.197ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
54392025-03-01T00:12:10.207ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
54402025-03-01T00:12:10.207ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
54412025-03-01T00:12:10.207ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
54422025-03-01T00:12:10.207ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
54432025-03-01T00:12:10.207ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54442025-03-01T00:12:10.208ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54452025-03-01T00:12:10.208ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54462025-03-01T00:12:10.208ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
54472025-03-01T00:12:10.212ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
54482025-03-01T00:12:10.256ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54492025-03-01T00:12:10.257ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54502025-03-01T00:12:10.257ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54512025-03-01T00:12:10.258ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50052 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
54522025-03-01T00:12:10.258ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = POST remote_addr = [::1]:50052 req_id = 894039ef-3da1-4e6d-8b98-e812ac060d2d sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
54532025-03-01T00:12:10.258ZINFOtest_instance_serial (SledAgent): simulated transition finish action = None desired_after = None id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a kind = instances requested_state = None server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 state_after = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None } state_before = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
54542025-03-01T00:12:10.259ZDEBGtest_instance_serial (NexusClient): client request body = Some(Body) method = PUT sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
54552025-03-01T00:12:10.260ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = b973846d-65c5-4f61-83b5-bb485845129e uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
54562025-03-01T00:12:10.260ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54572025-03-01T00:12:10.260ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54582025-03-01T00:12:10.262ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54592025-03-01T00:12:10.263ZINFOtest_instance_serial (dropshot_internal): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a remote_addr = 127.0.0.1:42630 req_id = b973846d-65c5-4f61-83b5-bb485845129e uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }
54602025-03-01T00:12:10.263ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = b973846d-65c5-4f61-83b5-bb485845129e resource = Database uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
54612025-03-01T00:12:10.264ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = b973846d-65c5-4f61-83b5-bb485845129e roles = RoleSet { roles: {} } uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
54622025-03-01T00:12:10.264ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = b973846d-65c5-4f61-83b5-bb485845129e resource = Database result = Ok(()) uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
54632025-03-01T00:12:10.265ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54642025-03-01T00:12:10.265ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54652025-03-01T00:12:10.266ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54662025-03-01T00:12:10.269ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") }
54672025-03-01T00:12:10.269ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
54682025-03-01T00:12:10.269ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54692025-03-01T00:12:10.269ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54702025-03-01T00:12:10.270ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54712025-03-01T00:12:10.271ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 11281 local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = b973846d-65c5-4f61-83b5-bb485845129e response_code = 204 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
54722025-03-01T00:12:10.272ZDEBGtest_instance_serial (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a", status: 204, headers: {"x-request-id": "b973846d-65c5-4f61-83b5-bb485845129e", "date": "Sat, 01 Mar 2025 00:12:09 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
54732025-03-01T00:12:10.272ZINFOtest_instance_serial (dropshot): request completed latency_us = 13271 local_addr = [::1]:38105 method = POST remote_addr = [::1]:50052 req_id = 894039ef-3da1-4e6d-8b98-e812ac060d2d response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
54742025-03-01T00:12:10.272ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
54752025-03-01T00:12:10.272ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54762025-03-01T00:12:10.272ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54772025-03-01T00:12:10.272ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54782025-03-01T00:12:10.274ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:43509/v1/instances/kris-picks?project=springfield-squidport
54792025-03-01T00:12:10.275ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 uri = /v1/instances/kris-picks?project=springfield-squidport
54802025-03-01T00:12:10.276ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 uri = /v1/instances/kris-picks?project=springfield-squidport
54812025-03-01T00:12:10.276ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/kris-picks?project=springfield-squidport
54822025-03-01T00:12:10.276ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
54832025-03-01T00:12:10.276ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
54842025-03-01T00:12:10.276ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
54852025-03-01T00:12:10.276ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
54862025-03-01T00:12:10.276ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54872025-03-01T00:12:10.276ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54882025-03-01T00:12:10.276ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54892025-03-01T00:12:10.278ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
54902025-03-01T00:12:10.278ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
54912025-03-01T00:12:10.278ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
54922025-03-01T00:12:10.280ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
54932025-03-01T00:12:10.302ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 26dd1eee-2faf-4c35-b70b-9324674f17ef, lookup_type: ByName("default") } result = Ok(())
54942025-03-01T00:12:10.302ZTRACtest_instance_serial (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = vpc_route_manager
54952025-03-01T00:12:10.302ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
54962025-03-01T00:12:10.302ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
54972025-03-01T00:12:10.304ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
54982025-03-01T00:12:10.305ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
54992025-03-01T00:12:10.305ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
55002025-03-01T00:12:10.305ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
55012025-03-01T00:12:10.305ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
55022025-03-01T00:12:10.306ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
55032025-03-01T00:12:10.306ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
55042025-03-01T00:12:10.306ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
55052025-03-01T00:12:10.306ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
55062025-03-01T00:12:10.308ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
55072025-03-01T00:12:10.308ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
55082025-03-01T00:12:10.308ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
55092025-03-01T00:12:10.309ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
55102025-03-01T00:12:10.310ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
55112025-03-01T00:12:10.310ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
55122025-03-01T00:12:10.311ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
55132025-03-01T00:12:10.312ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
55142025-03-01T00:12:10.315ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
55152025-03-01T00:12:10.315ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
55162025-03-01T00:12:10.315ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
55172025-03-01T00:12:10.315ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
55182025-03-01T00:12:10.316ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
55192025-03-01T00:12:10.316ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
55202025-03-01T00:12:10.317ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
55212025-03-01T00:12:10.318ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
55222025-03-01T00:12:10.318ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
55232025-03-01T00:12:10.320ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
55242025-03-01T00:12:10.320ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
55252025-03-01T00:12:10.320ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
55262025-03-01T00:12:10.321ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
55272025-03-01T00:12:10.321ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
55282025-03-01T00:12:10.324ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
55292025-03-01T00:12:10.324ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
55302025-03-01T00:12:10.324ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 0a0c9f59-6a31-43b0-969f-131b36ea3043, lookup_type: ByName("default") }
55312025-03-01T00:12:10.324ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
55322025-03-01T00:12:10.324ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
55332025-03-01T00:12:10.324ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
55342025-03-01T00:12:10.324ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
55352025-03-01T00:12:10.326ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
55362025-03-01T00:12:10.329ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
55372025-03-01T00:12:10.330ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 uri = /v1/instances/kris-picks?project=springfield-squidport
55382025-03-01T00:12:10.331ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55392025-03-01T00:12:10.331ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55402025-03-01T00:12:10.331ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55412025-03-01T00:12:10.331ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
55422025-03-01T00:12:10.331ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
55432025-03-01T00:12:10.331ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
55442025-03-01T00:12:10.331ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
55452025-03-01T00:12:10.333ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55462025-03-01T00:12:10.335ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55472025-03-01T00:12:10.335ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55482025-03-01T00:12:10.336ZTRACtest_instance_serial (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
55492025-03-01T00:12:10.336ZTRACtest_instance_serial (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database
55502025-03-01T00:12:10.336ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
55512025-03-01T00:12:10.336ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = Database result = Ok(())
55522025-03-01T00:12:10.336ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55532025-03-01T00:12:10.337ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55542025-03-01T00:12:10.338ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55552025-03-01T00:12:10.338ZDEBGtest_instance_serial (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
55562025-03-01T00:12:10.365ZDEBGtest_instance_serial (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) background_task = vpc_route_manager resource = InternetGateway { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: 7b27527e-c873-4059-a48d-0d5039286f85, lookup_type: ById(7b27527e-c873-4059-a48d-0d5039286f85) }, key: 0a0c9f59-6a31-43b0-969f-131b36ea3043, lookup_type: ByName("default") } result = Ok(())
55572025-03-01T00:12:10.367ZTRACtest_instance_serial (BackgroundTasks): successful lookup of siloed resource "InternetGateway" using built-in user background_task = vpc_route_manager
55582025-03-01T00:12:10.367ZDEBGtest_instance_serial (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:38105/vpc-routes
55592025-03-01T00:12:10.367ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50050 req_id = f8d9c9a0-d471-4133-bf13-0835ff30c2f7 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
55602025-03-01T00:12:10.368ZINFOtest_instance_serial (dropshot): request completed latency_us = 2144 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50050 req_id = f8d9c9a0-d471-4133-bf13-0835ff30c2f7 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
55612025-03-01T00:12:10.368ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks?project=springfield-squidport
55622025-03-01T00:12:10.368ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks?project=springfield-squidport
55632025-03-01T00:12:10.369ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55642025-03-01T00:12:10.369ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55652025-03-01T00:12:10.369ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55662025-03-01T00:12:10.370ZDEBGtest_instance_serial (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:38105/vpc-routes", status: 204, headers: {"x-request-id": "f8d9c9a0-d471-4133-bf13-0835ff30c2f7", "date": "Sat, 01 Mar 2025 00:12:10 GMT"} })
55672025-03-01T00:12:10.371ZDEBGtest_instance_serial (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 495.828392ms iteration = 2 status = {}
55682025-03-01T00:12:10.373ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks?project=springfield-squidport
55692025-03-01T00:12:10.374ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55702025-03-01T00:12:10.374ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55712025-03-01T00:12:10.374ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55722025-03-01T00:12:10.383ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks?project=springfield-squidport
55732025-03-01T00:12:10.385ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55742025-03-01T00:12:10.385ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55752025-03-01T00:12:10.385ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55762025-03-01T00:12:10.390ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks?project=springfield-squidport
55772025-03-01T00:12:10.401ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55782025-03-01T00:12:10.402ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks?project=springfield-squidport
55792025-03-01T00:12:10.402ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks?project=springfield-squidport
55802025-03-01T00:12:10.402ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55812025-03-01T00:12:10.402ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55822025-03-01T00:12:10.402ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55832025-03-01T00:12:10.405ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks?project=springfield-squidport
55842025-03-01T00:12:10.406ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55852025-03-01T00:12:10.406ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55862025-03-01T00:12:10.407ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55872025-03-01T00:12:10.408ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks?project=springfield-squidport
55882025-03-01T00:12:10.409ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55892025-03-01T00:12:10.409ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55902025-03-01T00:12:10.409ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55912025-03-01T00:12:10.412ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks?project=springfield-squidport
55922025-03-01T00:12:10.423ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55932025-03-01T00:12:10.424ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
55942025-03-01T00:12:10.424ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
55952025-03-01T00:12:10.425ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
55962025-03-01T00:12:10.434ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 159117 local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = b7e73948-ef3c-4787-86ba-3fe59e09b855 response_code = 200 uri = /v1/instances/kris-picks?project=springfield-squidport
55972025-03-01T00:12:10.435ZINFOtest_instance_serial (external client test context): client received response status = 200
55982025-03-01T00:12:10.645ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
55992025-03-01T00:12:10.646ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56002025-03-01T00:12:10.646ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56012025-03-01T00:12:10.646ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56022025-03-01T00:12:10.647ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56032025-03-01T00:12:10.648ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56042025-03-01T00:12:10.652ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 3710 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 856f4bb4-27b8-4b39-8483-6ba13539bb07 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56052025-03-01T00:12:10.653ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "856f4bb4-27b8-4b39-8483-6ba13539bb07", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:10 GMT"} })
56062025-03-01T00:12:10.653ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56072025-03-01T00:12:10.653ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56082025-03-01T00:12:10.653ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56092025-03-01T00:12:10.653ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56102025-03-01T00:12:10.653ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56112025-03-01T00:12:10.654ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 3464 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d7ac525a-6aec-4af5-92e6-4ea1518677df response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56122025-03-01T00:12:10.655ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "d7ac525a-6aec-4af5-92e6-4ea1518677df", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:10 GMT"} })
56132025-03-01T00:12:10.656ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
56142025-03-01T00:12:10.656ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56152025-03-01T00:12:10.656ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
56162025-03-01T00:12:10.722ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56172025-03-01T00:12:10.722ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56182025-03-01T00:12:10.735ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56192025-03-01T00:12:10.736ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56202025-03-01T00:12:10.736ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56212025-03-01T00:12:10.736ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56222025-03-01T00:12:11.091ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
56232025-03-01T00:12:11.092ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
56242025-03-01T00:12:11.092ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
56252025-03-01T00:12:11.096ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
56262025-03-01T00:12:11.097ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
56272025-03-01T00:12:11.100ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
56282025-03-01T00:12:11.100ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
56292025-03-01T00:12:11.722ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56302025-03-01T00:12:11.722ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56312025-03-01T00:12:11.727ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56322025-03-01T00:12:11.729ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56332025-03-01T00:12:11.729ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56342025-03-01T00:12:11.729ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56352025-03-01T00:12:12.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
56362025-03-01T00:12:12.090ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
56372025-03-01T00:12:12.090ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
56382025-03-01T00:12:12.095ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
56392025-03-01T00:12:12.096ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
56402025-03-01T00:12:12.098ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
56412025-03-01T00:12:12.098ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
56422025-03-01T00:12:12.646ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
56432025-03-01T00:12:12.646ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56442025-03-01T00:12:12.646ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56452025-03-01T00:12:12.647ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56462025-03-01T00:12:12.649ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56472025-03-01T00:12:12.649ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56482025-03-01T00:12:12.651ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 4865 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = b4059b0b-f229-4be1-bdbf-71b0e46d27a6 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56492025-03-01T00:12:12.652ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "b4059b0b-f229-4be1-bdbf-71b0e46d27a6", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:11 GMT"} })
56502025-03-01T00:12:12.652ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56512025-03-01T00:12:12.652ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56522025-03-01T00:12:12.653ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56532025-03-01T00:12:12.654ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56542025-03-01T00:12:12.654ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56552025-03-01T00:12:12.657ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 3744 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = fa160899-a5e3-46f8-9972-d4bc477ddb8e response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56562025-03-01T00:12:12.658ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "fa160899-a5e3-46f8-9972-d4bc477ddb8e", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:11 GMT"} })
56572025-03-01T00:12:12.658ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
56582025-03-01T00:12:12.658ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56592025-03-01T00:12:12.658ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
56602025-03-01T00:12:12.724ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56612025-03-01T00:12:12.732ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56622025-03-01T00:12:12.754ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56632025-03-01T00:12:12.755ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56642025-03-01T00:12:12.755ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56652025-03-01T00:12:12.755ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56662025-03-01T00:12:13.089ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
56672025-03-01T00:12:13.090ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
56682025-03-01T00:12:13.090ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
56692025-03-01T00:12:13.095ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
56702025-03-01T00:12:13.096ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
56712025-03-01T00:12:13.100ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
56722025-03-01T00:12:13.101ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
56732025-03-01T00:12:13.725ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56742025-03-01T00:12:13.727ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56752025-03-01T00:12:13.731ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56762025-03-01T00:12:13.732ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56772025-03-01T00:12:13.732ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56782025-03-01T00:12:13.732ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
56792025-03-01T00:12:14.089ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
56802025-03-01T00:12:14.089ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
56812025-03-01T00:12:14.091ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
56822025-03-01T00:12:14.093ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
56832025-03-01T00:12:14.093ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
56842025-03-01T00:12:14.096ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
56852025-03-01T00:12:14.096ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
56862025-03-01T00:12:14.645ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
56872025-03-01T00:12:14.646ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56882025-03-01T00:12:14.646ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56892025-03-01T00:12:14.647ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56902025-03-01T00:12:14.647ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56912025-03-01T00:12:14.647ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56922025-03-01T00:12:14.649ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 2970 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 348de9cf-549e-4dfa-aa57-2ab257cd5af0 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
56932025-03-01T00:12:14.650ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "348de9cf-549e-4dfa-aa57-2ab257cd5af0", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:14 GMT"} })
56942025-03-01T00:12:14.650ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56952025-03-01T00:12:14.650ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56962025-03-01T00:12:14.650ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56972025-03-01T00:12:14.650ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56982025-03-01T00:12:14.651ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
56992025-03-01T00:12:14.652ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 2546 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = d4b5ecba-c464-47a7-93da-a56cefa5f0a3 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
57002025-03-01T00:12:14.653ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "d4b5ecba-c464-47a7-93da-a56cefa5f0a3", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:14 GMT"} })
57012025-03-01T00:12:14.654ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
57022025-03-01T00:12:14.654ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
57032025-03-01T00:12:14.654ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
57042025-03-01T00:12:14.665ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
57052025-03-01T00:12:14.666ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
57062025-03-01T00:12:14.666ZINFOtest_instance_serial (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.15.1/src/server.rs:1025 local_addr = 127.0.0.1:43677 remote_addr = 127.0.0.1:52896
57072025-03-01T00:12:14.666ZTRACtest_instance_serial (dropshot): incoming request local_addr = 127.0.0.1:43677 method = GET remote_addr = 127.0.0.1:52896 req_id = c2b0fdb9-2ae6-43f4-afb0-2ab129c29c89 uri = /07ece834-ed97-4e95-ace6-eee27c1e42f0
57082025-03-01T00:12:14.679ZINFOtest_instance_serial (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-6f17d22bba15001f/dropshot-0.15.1/src/server.rs:867 latency_us = 13688 local_addr = 127.0.0.1:43677 method = GET remote_addr = 127.0.0.1:52896 req_id = c2b0fdb9-2ae6-43f4-afb0-2ab129c29c89 response_code = 200 uri = /07ece834-ed97-4e95-ace6-eee27c1e42f0
57092025-03-01T00:12:14.684ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
57102025-03-01T00:12:14.706ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
57112025-03-01T00:12:14.707ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
57122025-03-01T00:12:14.707ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
57132025-03-01T00:12:14.707ZDEBGtest_instance_serial (results-sink): inserting 34 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
57142025-03-01T00:12:14.708ZDEBGtest_instance_serial (clickhouse-client): unrolling 34 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57152025-03-01T00:12:14.708ZDEBGtest_instance_serial (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57162025-03-01T00:12:14.708ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('integration_target:integration_metric') FORMAT Native;
57172025-03-01T00:12:14.717ZTRACtest_instance_serial (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57182025-03-01T00:12:14.718ZDEBGtest_instance_serial (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c schema = TimeseriesSchema { timeseries_name: TimeseriesName("http_service:request_latency_histogram"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "name", field_type: String, source: Target, description: "" }, FieldSchema { name: "operation_id", field_type: String, source: Metric, description: "" }, FieldSchema { name: "status_code", field_type: U16, source: Metric, description: "" }}, datum_type: HistogramU64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:14.708004380Z } timeseries_name = http_service:request_latency_histogram
57192025-03-01T00:12:14.726ZDEBGtest_instance_serial (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57202025-03-01T00:12:14.727ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
57212025-03-01T00:12:14.727ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
57222025-03-01T00:12:14.730ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
57232025-03-01T00:12:14.732ZTRACtest_instance_serial (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57242025-03-01T00:12:14.732ZDEBGtest_instance_serial (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:cpus_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:14.726831692Z } timeseries_name = collection_target:cpus_provisioned
57252025-03-01T00:12:14.733ZDEBGtest_instance_serial (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57262025-03-01T00:12:14.733ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
57272025-03-01T00:12:14.739ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
57282025-03-01T00:12:14.740ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
57292025-03-01T00:12:14.745ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
57302025-03-01T00:12:14.745ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
57312025-03-01T00:12:14.745ZTRACtest_instance_serial (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57322025-03-01T00:12:14.745ZDEBGtest_instance_serial (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:ram_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:14.732988702Z } timeseries_name = collection_target:ram_provisioned
57332025-03-01T00:12:14.745ZDEBGtest_instance_serial (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57342025-03-01T00:12:14.745ZTRACtest_instance_serial (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'http_service:request_latency_histogram', 'integration_target:integration_metric') FORMAT Native;
57352025-03-01T00:12:14.747ZTRACtest_instance_serial (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57362025-03-01T00:12:14.747ZDEBGtest_instance_serial (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:virtual_disk_space_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2025-03-01T00:12:14.741970587Z } timeseries_name = collection_target:virtual_disk_space_provisioned
57372025-03-01T00:12:14.759ZDEBGtest_instance_serial (clickhouse-client): inserting 4 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57382025-03-01T00:12:14.765ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 6 n_rows = 4 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
57392025-03-01T00:12:14.770ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 26 sql = INSERT INTO oximeter.fields_string FORMAT Native
57402025-03-01T00:12:14.773ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 26 table_name = fields_string
57412025-03-01T00:12:14.773ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 13 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
57422025-03-01T00:12:14.778ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 13 table_name = fields_u16
57432025-03-01T00:12:14.779ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 28 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
57442025-03-01T00:12:14.790ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 28 table_name = fields_uuid
57452025-03-01T00:12:14.791ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 19 n_rows = 13 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
57462025-03-01T00:12:14.802ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 13 table_name = measurements_histogramu64
57472025-03-01T00:12:14.802ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 21 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
57482025-03-01T00:12:14.809ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 21 table_name = measurements_i64
57492025-03-01T00:12:14.809ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
57502025-03-01T00:12:15.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
57512025-03-01T00:12:15.090ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
57522025-03-01T00:12:15.091ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
57532025-03-01T00:12:15.094ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
57542025-03-01T00:12:15.094ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
57552025-03-01T00:12:15.097ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
57562025-03-01T00:12:15.097ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
57572025-03-01T00:12:15.440ZINFOtest_instance_serial (nexus): registering Oso class class = Action
57582025-03-01T00:12:15.440ZINFOtest_instance_serial (nexus): registering Oso class class = AnyActor
57592025-03-01T00:12:15.440ZINFOtest_instance_serial (nexus): registering Oso class class = AuthenticatedActor
57602025-03-01T00:12:15.440ZINFOtest_instance_serial (nexus): registering Oso class class = BlueprintConfig
57612025-03-01T00:12:15.440ZINFOtest_instance_serial (nexus): registering Oso class class = Database
57622025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = DnsConfig
57632025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = Fleet
57642025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = Inventory
57652025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = IpPoolList
57662025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = ConsoleSessionList
57672025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAuthRequestList
57682025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = SiloCertificateList
57692025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = SiloIdentityProviderList
57702025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = SiloUserList
57712025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = Project
57722025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = Disk
57732025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = Snapshot
57742025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = ProjectImage
57752025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = Instance
57762025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = IpPool
57772025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = InstanceNetworkInterface
57782025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = Vpc
57792025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = VpcRouter
57802025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGateway
57812025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGatewayIpPool
57822025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGatewayIpAddress
57832025-03-01T00:12:15.441ZINFOtest_instance_serial (nexus): registering Oso class class = RouterRoute
57842025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = VpcSubnet
57852025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = FloatingIp
57862025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = Image
57872025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = SiloImage
57882025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = AddressLot
57892025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = Blueprint
57902025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = LoopbackAddress
57912025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = Certificate
57922025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = ConsoleSession
57932025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAuthRequest
57942025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAccessToken
57952025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = PhysicalDisk
57962025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = Rack
57972025-03-01T00:12:15.442ZINFOtest_instance_serial (nexus): registering Oso class class = RoleBuiltin
57982025-03-01T00:12:15.443ZINFOtest_instance_serial (nexus): registering Oso class class = SshKey
57992025-03-01T00:12:15.443ZINFOtest_instance_serial (nexus): registering Oso class class = Silo
58002025-03-01T00:12:15.443ZINFOtest_instance_serial (nexus): registering Oso class class = SiloUser
58012025-03-01T00:12:15.443ZINFOtest_instance_serial (nexus): registering Oso class class = SiloGroup
58022025-03-01T00:12:15.444ZINFOtest_instance_serial (nexus): registering Oso class class = SupportBundle
58032025-03-01T00:12:15.444ZINFOtest_instance_serial (nexus): registering Oso class class = IdentityProvider
58042025-03-01T00:12:15.444ZINFOtest_instance_serial (nexus): registering Oso class class = SamlIdentityProvider
58052025-03-01T00:12:15.444ZINFOtest_instance_serial (nexus): registering Oso class class = Sled
58062025-03-01T00:12:15.444ZINFOtest_instance_serial (nexus): registering Oso class class = TufRepo
58072025-03-01T00:12:15.444ZINFOtest_instance_serial (nexus): registering Oso class class = TufArtifact
58082025-03-01T00:12:15.445ZINFOtest_instance_serial (nexus): registering Oso class class = Zpool
58092025-03-01T00:12:15.445ZINFOtest_instance_serial (nexus): registering Oso class class = Service
58102025-03-01T00:12:15.445ZINFOtest_instance_serial (nexus): registering Oso class class = UserBuiltin
58112025-03-01T00:12:15.445ZINFOtest_instance_serial (nexus): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
58122025-03-01T00:12:15.462ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58132025-03-01T00:12:15.463ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58142025-03-01T00:12:15.463ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58152025-03-01T00:12:15.469ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58162025-03-01T00:12:15.470ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58172025-03-01T00:12:15.470ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58182025-03-01T00:12:15.474ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58192025-03-01T00:12:15.474ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58202025-03-01T00:12:15.475ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58212025-03-01T00:12:15.477ZTRACtest_instance_serial (nexus): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
58222025-03-01T00:12:15.477ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
58232025-03-01T00:12:15.477ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58242025-03-01T00:12:15.477ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58252025-03-01T00:12:15.478ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58262025-03-01T00:12:15.482ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
58272025-03-01T00:12:15.482ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58282025-03-01T00:12:15.482ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58292025-03-01T00:12:15.483ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58302025-03-01T00:12:15.485ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58312025-03-01T00:12:15.485ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58322025-03-01T00:12:15.485ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58332025-03-01T00:12:15.486ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58342025-03-01T00:12:15.489ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
58352025-03-01T00:12:15.497ZDEBGtest_instance_serial (nexus): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(())
58362025-03-01T00:12:15.497ZTRACtest_instance_serial (nexus): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
58372025-03-01T00:12:15.497ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
58382025-03-01T00:12:15.497ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58392025-03-01T00:12:15.497ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58402025-03-01T00:12:15.498ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58412025-03-01T00:12:15.500ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
58422025-03-01T00:12:15.501ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58432025-03-01T00:12:15.501ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58442025-03-01T00:12:15.501ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58452025-03-01T00:12:15.504ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58462025-03-01T00:12:15.505ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58472025-03-01T00:12:15.505ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58482025-03-01T00:12:15.505ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58492025-03-01T00:12:15.508ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
58502025-03-01T00:12:15.515ZDEBGtest_instance_serial (nexus): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(())
58512025-03-01T00:12:15.515ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
58522025-03-01T00:12:15.515ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
58532025-03-01T00:12:15.515ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
58542025-03-01T00:12:15.519ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
58552025-03-01T00:12:15.519ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
58562025-03-01T00:12:15.519ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
58572025-03-01T00:12:15.522ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
58582025-03-01T00:12:15.522ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58592025-03-01T00:12:15.522ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
58602025-03-01T00:12:15.522ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
58612025-03-01T00:12:15.523ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
58622025-03-01T00:12:15.525ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
58632025-03-01T00:12:15.529ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
58642025-03-01T00:12:15.564ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50054 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
58652025-03-01T00:12:15.565ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = POST remote_addr = [::1]:50054 req_id = 9faed7b8-9952-4bde-8e9a-4281aa357794 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
58662025-03-01T00:12:15.565ZINFOtest_instance_serial (SledAgent): simulated transition finish action = None desired_after = None id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a kind = instances requested_state = None server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 state_after = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None } state_before = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
58672025-03-01T00:12:15.565ZDEBGtest_instance_serial (NexusClient): client request body = Some(Body) method = PUT sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
58682025-03-01T00:12:15.565ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = 742019e5-770f-43f7-8651-b4be40804d1d uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
58692025-03-01T00:12:15.565ZINFOtest_instance_serial (dropshot_internal): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a remote_addr = 127.0.0.1:42630 req_id = 742019e5-770f-43f7-8651-b4be40804d1d uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a vmm_state = VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }
58702025-03-01T00:12:15.566ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = 742019e5-770f-43f7-8651-b4be40804d1d resource = Database uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
58712025-03-01T00:12:15.566ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = 742019e5-770f-43f7-8651-b4be40804d1d roles = RoleSet { roles: {} } uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
58722025-03-01T00:12:15.567ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = 742019e5-770f-43f7-8651-b4be40804d1d resource = Database result = Ok(()) uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
58732025-03-01T00:12:15.572ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 6863 local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = 742019e5-770f-43f7-8651-b4be40804d1d response_code = 204 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
58742025-03-01T00:12:15.573ZDEBGtest_instance_serial (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a", status: 204, headers: {"x-request-id": "742019e5-770f-43f7-8651-b4be40804d1d", "date": "Sat, 01 Mar 2025 00:12:14 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
58752025-03-01T00:12:15.573ZINFOtest_instance_serial (dropshot): request completed latency_us = 7951 local_addr = [::1]:38105 method = POST remote_addr = [::1]:50054 req_id = 9faed7b8-9952-4bde-8e9a-4281aa357794 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
58762025-03-01T00:12:15.574ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:43509/v1/instances/kris-picks?project=springfield-squidport
58772025-03-01T00:12:15.574ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 uri = /v1/instances/kris-picks?project=springfield-squidport
58782025-03-01T00:12:15.575ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 uri = /v1/instances/kris-picks?project=springfield-squidport
58792025-03-01T00:12:15.575ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/kris-picks?project=springfield-squidport
58802025-03-01T00:12:15.575ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58812025-03-01T00:12:15.575ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
58822025-03-01T00:12:15.576ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58832025-03-01T00:12:15.578ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58842025-03-01T00:12:15.578ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
58852025-03-01T00:12:15.578ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58862025-03-01T00:12:15.580ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
58872025-03-01T00:12:15.580ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
58882025-03-01T00:12:15.580ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58892025-03-01T00:12:15.580ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
58902025-03-01T00:12:15.581ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58912025-03-01T00:12:15.582ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
58922025-03-01T00:12:15.582ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58932025-03-01T00:12:15.582ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
58942025-03-01T00:12:15.583ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
58952025-03-01T00:12:15.584ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
58962025-03-01T00:12:15.587ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
58972025-03-01T00:12:15.590ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
58982025-03-01T00:12:15.590ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
58992025-03-01T00:12:15.590ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59002025-03-01T00:12:15.590ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
59012025-03-01T00:12:15.590ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
59022025-03-01T00:12:15.590ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59032025-03-01T00:12:15.590ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
59042025-03-01T00:12:15.590ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59052025-03-01T00:12:15.592ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
59062025-03-01T00:12:15.592ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
59072025-03-01T00:12:15.592ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
59082025-03-01T00:12:15.592ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
59092025-03-01T00:12:15.594ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
59102025-03-01T00:12:15.598ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
59112025-03-01T00:12:15.599ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 uri = /v1/instances/kris-picks?project=springfield-squidport
59122025-03-01T00:12:15.599ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59132025-03-01T00:12:15.599ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59142025-03-01T00:12:15.599ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59152025-03-01T00:12:15.601ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59162025-03-01T00:12:15.604ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59172025-03-01T00:12:15.604ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59182025-03-01T00:12:15.604ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59192025-03-01T00:12:15.604ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59202025-03-01T00:12:15.605ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59212025-03-01T00:12:15.608ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks?project=springfield-squidport
59222025-03-01T00:12:15.608ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks?project=springfield-squidport
59232025-03-01T00:12:15.608ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59242025-03-01T00:12:15.608ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59252025-03-01T00:12:15.608ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59262025-03-01T00:12:15.612ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks?project=springfield-squidport
59272025-03-01T00:12:15.614ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59282025-03-01T00:12:15.614ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59292025-03-01T00:12:15.614ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59302025-03-01T00:12:15.615ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks?project=springfield-squidport
59312025-03-01T00:12:15.615ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59322025-03-01T00:12:15.615ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59332025-03-01T00:12:15.616ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59342025-03-01T00:12:15.618ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks?project=springfield-squidport
59352025-03-01T00:12:15.623ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59362025-03-01T00:12:15.623ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks?project=springfield-squidport
59372025-03-01T00:12:15.624ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks?project=springfield-squidport
59382025-03-01T00:12:15.624ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59392025-03-01T00:12:15.624ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59402025-03-01T00:12:15.624ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59412025-03-01T00:12:15.626ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks?project=springfield-squidport
59422025-03-01T00:12:15.629ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59432025-03-01T00:12:15.629ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59442025-03-01T00:12:15.629ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59452025-03-01T00:12:15.629ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks?project=springfield-squidport
59462025-03-01T00:12:15.629ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59472025-03-01T00:12:15.629ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59482025-03-01T00:12:15.629ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59492025-03-01T00:12:15.631ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks?project=springfield-squidport
59502025-03-01T00:12:15.636ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59512025-03-01T00:12:15.639ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
59522025-03-01T00:12:15.639ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
59532025-03-01T00:12:15.639ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
59542025-03-01T00:12:15.639ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 64559 local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 9a328ab7-621b-4bba-a4fc-4d71d62a1fe5 response_code = 200 uri = /v1/instances/kris-picks?project=springfield-squidport
59552025-03-01T00:12:15.639ZINFOtest_instance_serial (external client test context): client received response status = 200
59562025-03-01T00:12:15.736ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59572025-03-01T00:12:15.736ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59582025-03-01T00:12:15.749ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59592025-03-01T00:12:15.763ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59602025-03-01T00:12:15.764ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59612025-03-01T00:12:15.764ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59622025-03-01T00:12:16.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
59632025-03-01T00:12:16.090ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
59642025-03-01T00:12:16.090ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
59652025-03-01T00:12:16.095ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
59662025-03-01T00:12:16.095ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
59672025-03-01T00:12:16.102ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
59682025-03-01T00:12:16.102ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
59692025-03-01T00:12:16.647ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
59702025-03-01T00:12:16.647ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59712025-03-01T00:12:16.647ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 95eb70ce-e15a-4428-9cce-862aaed02425 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59722025-03-01T00:12:16.647ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 95eb70ce-e15a-4428-9cce-862aaed02425 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59732025-03-01T00:12:16.647ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 95eb70ce-e15a-4428-9cce-862aaed02425 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59742025-03-01T00:12:16.647ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 95eb70ce-e15a-4428-9cce-862aaed02425 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59752025-03-01T00:12:16.652ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 3767 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 95eb70ce-e15a-4428-9cce-862aaed02425 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
59762025-03-01T00:12:16.652ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "95eb70ce-e15a-4428-9cce-862aaed02425", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:15 GMT"} })
59772025-03-01T00:12:16.652ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59782025-03-01T00:12:16.652ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59792025-03-01T00:12:16.652ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59802025-03-01T00:12:16.652ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59812025-03-01T00:12:16.652ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59822025-03-01T00:12:16.654ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 3436 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e98c12ee-3286-42a7-b011-2a18bb7264f0 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
59832025-03-01T00:12:16.655ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e98c12ee-3286-42a7-b011-2a18bb7264f0", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:15 GMT"} })
59842025-03-01T00:12:16.655ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
59852025-03-01T00:12:16.655ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59862025-03-01T00:12:16.655ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
59872025-03-01T00:12:16.723ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59882025-03-01T00:12:16.738ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59892025-03-01T00:12:16.738ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59902025-03-01T00:12:16.738ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59912025-03-01T00:12:16.739ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59922025-03-01T00:12:16.739ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
59932025-03-01T00:12:17.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
59942025-03-01T00:12:17.090ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
59952025-03-01T00:12:17.091ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
59962025-03-01T00:12:17.095ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
59972025-03-01T00:12:17.096ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
59982025-03-01T00:12:17.101ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
59992025-03-01T00:12:17.101ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
60002025-03-01T00:12:17.727ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60012025-03-01T00:12:17.727ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60022025-03-01T00:12:17.733ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60032025-03-01T00:12:17.736ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60042025-03-01T00:12:17.736ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60052025-03-01T00:12:17.736ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60062025-03-01T00:12:18.091ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
60072025-03-01T00:12:18.092ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
60082025-03-01T00:12:18.092ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
60092025-03-01T00:12:18.094ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
60102025-03-01T00:12:18.095ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
60112025-03-01T00:12:18.099ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
60122025-03-01T00:12:18.099ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
60132025-03-01T00:12:18.647ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
60142025-03-01T00:12:18.648ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
60152025-03-01T00:12:18.648ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
60162025-03-01T00:12:18.648ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
60172025-03-01T00:12:18.648ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
60182025-03-01T00:12:18.648ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
60192025-03-01T00:12:18.650ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 3461 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 210fd997-7e1e-40b8-8c9f-34994c67796f response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
60202025-03-01T00:12:18.652ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "210fd997-7e1e-40b8-8c9f-34994c67796f", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:17 GMT"} })
60212025-03-01T00:12:18.653ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
60222025-03-01T00:12:18.653ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
60232025-03-01T00:12:18.653ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
60242025-03-01T00:12:18.653ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
60252025-03-01T00:12:18.653ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
60262025-03-01T00:12:18.670ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 19142 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 01ea3f21-caab-4b73-ab17-10270b3ee0fd response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
60272025-03-01T00:12:18.671ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "01ea3f21-caab-4b73-ab17-10270b3ee0fd", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:17 GMT"} })
60282025-03-01T00:12:18.672ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
60292025-03-01T00:12:18.672ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60302025-03-01T00:12:18.672ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
60312025-03-01T00:12:18.722ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60322025-03-01T00:12:18.737ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60332025-03-01T00:12:18.771ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60342025-03-01T00:12:18.772ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60352025-03-01T00:12:18.773ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60362025-03-01T00:12:18.773ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60372025-03-01T00:12:19.089ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
60382025-03-01T00:12:19.090ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
60392025-03-01T00:12:19.092ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
60402025-03-01T00:12:19.096ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
60412025-03-01T00:12:19.097ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
60422025-03-01T00:12:19.100ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
60432025-03-01T00:12:19.100ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
60442025-03-01T00:12:19.731ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60452025-03-01T00:12:19.732ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60462025-03-01T00:12:19.745ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60472025-03-01T00:12:19.746ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60482025-03-01T00:12:19.746ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60492025-03-01T00:12:19.746ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
60502025-03-01T00:12:19.784ZINFOtest_instance_serial (SledAgent): noop transition id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a kind = instances server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 target = Running
60512025-03-01T00:12:19.785ZINFOtest_instance_serial (SledAgent-insure_instance_state): sim_ensure success server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 vmm_state = SledVmmState {\n migration_in: None,\n migration_out: None,\n vmm_state: VmmRuntimeState {\n gen: Generation(\n 2,\n ),\n state: Starting,\n time_updated: 2025-03-01T00:12:09.526791825Z,\n },\n}
60522025-03-01T00:12:20.091ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
60532025-03-01T00:12:20.092ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
60542025-03-01T00:12:20.092ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
60552025-03-01T00:12:20.098ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
60562025-03-01T00:12:20.099ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
60572025-03-01T00:12:20.103ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
60582025-03-01T00:12:20.103ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
60592025-03-01T00:12:20.641ZINFOtest_instance_serial (nexus): registering Oso class class = Action
60602025-03-01T00:12:20.642ZINFOtest_instance_serial (nexus): registering Oso class class = AnyActor
60612025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = AuthenticatedActor
60622025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = BlueprintConfig
60632025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = Database
60642025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = DnsConfig
60652025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = Fleet
60662025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = Inventory
60672025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = IpPoolList
60682025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = ConsoleSessionList
60692025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAuthRequestList
60702025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = SiloCertificateList
60712025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = SiloIdentityProviderList
60722025-03-01T00:12:20.643ZINFOtest_instance_serial (nexus): registering Oso class class = SiloUserList
60732025-03-01T00:12:20.648ZINFOtest_instance_serial (nexus): registering Oso class class = Project
60742025-03-01T00:12:20.650ZINFOtest_instance_serial (nexus): registering Oso class class = Disk
60752025-03-01T00:12:20.650ZINFOtest_instance_serial (nexus): registering Oso class class = Snapshot
60762025-03-01T00:12:20.650ZINFOtest_instance_serial (nexus): registering Oso class class = ProjectImage
60772025-03-01T00:12:20.650ZINFOtest_instance_serial (nexus): registering Oso class class = Instance
60782025-03-01T00:12:20.650ZINFOtest_instance_serial (nexus): registering Oso class class = IpPool
60792025-03-01T00:12:20.650ZINFOtest_instance_serial (nexus): registering Oso class class = InstanceNetworkInterface
60802025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = Vpc
60812025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = VpcRouter
60822025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGateway
60832025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGatewayIpPool
60842025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = InternetGatewayIpAddress
60852025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = RouterRoute
60862025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = VpcSubnet
60872025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = FloatingIp
60882025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = Image
60892025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = SiloImage
60902025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = AddressLot
60912025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = Blueprint
60922025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = LoopbackAddress
60932025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = Certificate
60942025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = ConsoleSession
60952025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAuthRequest
60962025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = DeviceAccessToken
60972025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = PhysicalDisk
60982025-03-01T00:12:20.651ZINFOtest_instance_serial (nexus): registering Oso class class = Rack
60992025-03-01T00:12:20.652ZINFOtest_instance_serial (nexus): registering Oso class class = RoleBuiltin
61002025-03-01T00:12:20.652ZINFOtest_instance_serial (nexus): registering Oso class class = SshKey
61012025-03-01T00:12:20.652ZINFOtest_instance_serial (nexus): registering Oso class class = Silo
61022025-03-01T00:12:20.652ZINFOtest_instance_serial (nexus): registering Oso class class = SiloUser
61032025-03-01T00:12:20.652ZINFOtest_instance_serial (nexus): registering Oso class class = SiloGroup
61042025-03-01T00:12:20.652ZINFOtest_instance_serial (nexus): registering Oso class class = SupportBundle
61052025-03-01T00:12:20.652ZINFOtest_instance_serial (nexus): registering Oso class class = IdentityProvider
61062025-03-01T00:12:20.652ZINFOtest_instance_serial (nexus): registering Oso class class = SamlIdentityProvider
61072025-03-01T00:12:20.653ZINFOtest_instance_serial (nexus): registering Oso class class = Sled
61082025-03-01T00:12:20.653ZINFOtest_instance_serial (nexus): registering Oso class class = TufRepo
61092025-03-01T00:12:20.653ZINFOtest_instance_serial (nexus): registering Oso class class = TufArtifact
61102025-03-01T00:12:20.653ZINFOtest_instance_serial (nexus): registering Oso class class = Zpool
61112025-03-01T00:12:20.654ZINFOtest_instance_serial (nexus): registering Oso class class = Service
61122025-03-01T00:12:20.654ZINFOtest_instance_serial (nexus): registering Oso class class = UserBuiltin
61132025-03-01T00:12:20.654ZINFOtest_instance_serial (nexus): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
61142025-03-01T00:12:20.660ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61152025-03-01T00:12:20.660ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61162025-03-01T00:12:20.661ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61172025-03-01T00:12:20.661ZINFOtest_instance_serial (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:474
61182025-03-01T00:12:20.662ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61192025-03-01T00:12:20.662ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61202025-03-01T00:12:20.662ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24 resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61212025-03-01T00:12:20.662ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24 roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61222025-03-01T00:12:20.663ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24 resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61232025-03-01T00:12:20.663ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61242025-03-01T00:12:20.663ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61252025-03-01T00:12:20.664ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61262025-03-01T00:12:20.666ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 3972 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = 56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
61272025-03-01T00:12:20.666ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61282025-03-01T00:12:20.667ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61292025-03-01T00:12:20.667ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61302025-03-01T00:12:20.667ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "56aa6b2e-3f4f-4b08-a851-02ea9dbb8a24", "content-length": "405", "date": "Sat, 01 Mar 2025 00:12:19 GMT"} })
61312025-03-01T00:12:20.667ZDEBGtest_instance_serial (oximeter): client request body = None method = GET uri = http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
61322025-03-01T00:12:20.668ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
61332025-03-01T00:12:20.669ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac resource = Database uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
61342025-03-01T00:12:20.669ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac roles = RoleSet { roles: {} } uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
61352025-03-01T00:12:20.670ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac resource = Database result = Ok(()) uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
61362025-03-01T00:12:20.671ZTRACtest_instance_serial (nexus): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
61372025-03-01T00:12:20.671ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
61382025-03-01T00:12:20.672ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61392025-03-01T00:12:20.672ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61402025-03-01T00:12:20.672ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61412025-03-01T00:12:20.675ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 6691 local_addr = 127.0.0.1:41715 method = GET remote_addr = 127.0.0.1:42654 req_id = e89e0cb6-f787-4053-ad9e-25e33e51e3ac response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
61422025-03-01T00:12:20.675ZDEBGtest_instance_serial (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:41715/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "e89e0cb6-f787-4053-ad9e-25e33e51e3ac", "content-length": "29", "date": "Sat, 01 Mar 2025 00:12:19 GMT"} })
61432025-03-01T00:12:20.675ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 07ece834-ed97-4e95-ace6-eee27c1e42f0
61442025-03-01T00:12:20.675ZTRACtest_instance_serial (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61452025-03-01T00:12:20.675ZINFOtest_instance_serial (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:549 n_current_tasks = 2 n_pruned_tasks = 0
61462025-03-01T00:12:20.677ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
61472025-03-01T00:12:20.677ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61482025-03-01T00:12:20.677ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61492025-03-01T00:12:20.678ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61502025-03-01T00:12:20.680ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
61512025-03-01T00:12:20.681ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61522025-03-01T00:12:20.681ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61532025-03-01T00:12:20.681ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61542025-03-01T00:12:20.683ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
61552025-03-01T00:12:20.691ZDEBGtest_instance_serial (nexus): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(())
61562025-03-01T00:12:20.691ZTRACtest_instance_serial (nexus): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
61572025-03-01T00:12:20.691ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
61582025-03-01T00:12:20.691ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61592025-03-01T00:12:20.691ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61602025-03-01T00:12:20.692ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61612025-03-01T00:12:20.701ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
61622025-03-01T00:12:20.701ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61632025-03-01T00:12:20.702ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61642025-03-01T00:12:20.702ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61652025-03-01T00:12:20.705ZTRACtest_instance_serial (nexus): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
61662025-03-01T00:12:20.706ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61672025-03-01T00:12:20.706ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61682025-03-01T00:12:20.706ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61692025-03-01T00:12:20.709ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
61702025-03-01T00:12:20.716ZDEBGtest_instance_serial (nexus): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(())
61712025-03-01T00:12:20.716ZTRACtest_instance_serial (nexus): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
61722025-03-01T00:12:20.716ZDEBGtest_instance_serial (nexus): roles roles = RoleSet { roles: {} }
61732025-03-01T00:12:20.716ZDEBGtest_instance_serial (nexus): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
61742025-03-01T00:12:20.721ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
61752025-03-01T00:12:20.721ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
61762025-03-01T00:12:20.722ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
61772025-03-01T00:12:20.723ZDEBGtest_instance_serial (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61782025-03-01T00:12:20.723ZDEBGtest_instance_serial (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61792025-03-01T00:12:20.728ZTRACtest_instance_serial (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61802025-03-01T00:12:20.728ZDEBGtest_instance_serial (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61812025-03-01T00:12:20.728ZTRACtest_instance_serial (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61822025-03-01T00:12:20.728ZTRACtest_instance_serial (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
61832025-03-01T00:12:20.731ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
61842025-03-01T00:12:20.731ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
61852025-03-01T00:12:20.732ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
61862025-03-01T00:12:20.732ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
61872025-03-01T00:12:20.732ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
61882025-03-01T00:12:20.742ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
61892025-03-01T00:12:20.746ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
61902025-03-01T00:12:20.786ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50056 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
61912025-03-01T00:12:20.788ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = POST remote_addr = [::1]:50056 req_id = a4b4810d-3bc8-42f4-a3b8-3b1bf90786bc sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
61922025-03-01T00:12:20.789ZINFOtest_instance_serial (SledAgent): simulated transition finish action = None desired_after = None id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a kind = instances requested_state = Some(Running) server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 state_after = SledVmmState { vmm_state: VmmRuntimeState { state: Running, gen: Generation(3), time_updated: 2025-03-01T00:12:20.789619453Z }, migration_in: None, migration_out: None } state_before = SledVmmState { vmm_state: VmmRuntimeState { state: Starting, gen: Generation(2), time_updated: 2025-03-01T00:12:09.526791825Z }, migration_in: None, migration_out: None }
61932025-03-01T00:12:20.789ZDEBGtest_instance_serial (NexusClient): client request body = Some(Body) method = PUT sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
61942025-03-01T00:12:20.790ZTRACtest_instance_serial (dropshot_internal): incoming request local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = baf7a501-33df-42c7-9246-081a2ebf76bd uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
61952025-03-01T00:12:20.791ZINFOtest_instance_serial (dropshot_internal): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a remote_addr = 127.0.0.1:42630 req_id = baf7a501-33df-42c7-9246-081a2ebf76bd uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a vmm_state = VmmRuntimeState { state: Running, gen: Generation(3), time_updated: 2025-03-01T00:12:20.789619453Z }
61962025-03-01T00:12:20.791ZTRACtest_instance_serial (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = baf7a501-33df-42c7-9246-081a2ebf76bd resource = Database uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
61972025-03-01T00:12:20.791ZDEBGtest_instance_serial (dropshot_internal): roles actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = baf7a501-33df-42c7-9246-081a2ebf76bd roles = RoleSet { roles: {} } uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
61982025-03-01T00:12:20.792ZDEBGtest_instance_serial (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002, .. }) actor_id = 001de000-05e4-4000-8000-000000000002 authenticated = true local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = baf7a501-33df-42c7-9246-081a2ebf76bd resource = Database result = Ok(()) uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
61992025-03-01T00:12:20.827ZINFOtest_instance_serial (dropshot_internal): request completed latency_us = 37073 local_addr = 127.0.0.1:41715 method = PUT remote_addr = 127.0.0.1:42630 req_id = baf7a501-33df-42c7-9246-081a2ebf76bd response_code = 204 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a
62002025-03-01T00:12:20.828ZDEBGtest_instance_serial (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:41715/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a", status: 204, headers: {"x-request-id": "baf7a501-33df-42c7-9246-081a2ebf76bd", "date": "Sat, 01 Mar 2025 00:12:20 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
62012025-03-01T00:12:20.830ZINFOtest_instance_serial (dropshot): request completed latency_us = 39914 local_addr = [::1]:38105 method = POST remote_addr = [::1]:50056 req_id = a4b4810d-3bc8-42f4-a3b8-3b1bf90786bc response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/poke
62022025-03-01T00:12:20.830ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:43509/v1/instances/kris-picks?project=springfield-squidport
62032025-03-01T00:12:20.830ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae uri = /v1/instances/kris-picks?project=springfield-squidport
62042025-03-01T00:12:20.830ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae uri = /v1/instances/kris-picks?project=springfield-squidport
62052025-03-01T00:12:20.830ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/kris-picks?project=springfield-squidport
62062025-03-01T00:12:20.831ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62072025-03-01T00:12:20.831ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
62082025-03-01T00:12:20.831ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62092025-03-01T00:12:20.833ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62102025-03-01T00:12:20.834ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
62112025-03-01T00:12:20.834ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62122025-03-01T00:12:20.835ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
62132025-03-01T00:12:20.836ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
62142025-03-01T00:12:20.838ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62152025-03-01T00:12:20.838ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
62162025-03-01T00:12:20.838ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62172025-03-01T00:12:20.838ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
62182025-03-01T00:12:20.839ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62192025-03-01T00:12:20.839ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
62202025-03-01T00:12:20.839ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62212025-03-01T00:12:20.840ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
62222025-03-01T00:12:20.843ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
62232025-03-01T00:12:20.844ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62242025-03-01T00:12:20.844ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
62252025-03-01T00:12:20.844ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62262025-03-01T00:12:20.845ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
62272025-03-01T00:12:20.846ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
62282025-03-01T00:12:20.846ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62292025-03-01T00:12:20.846ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
62302025-03-01T00:12:20.846ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62312025-03-01T00:12:20.848ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
62322025-03-01T00:12:20.848ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
62332025-03-01T00:12:20.848ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
62342025-03-01T00:12:20.848ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
62352025-03-01T00:12:20.850ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
62362025-03-01T00:12:20.853ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
62372025-03-01T00:12:20.853ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae uri = /v1/instances/kris-picks?project=springfield-squidport
62382025-03-01T00:12:20.853ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62392025-03-01T00:12:20.853ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62402025-03-01T00:12:20.853ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62412025-03-01T00:12:20.855ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62422025-03-01T00:12:20.855ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62432025-03-01T00:12:20.856ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62442025-03-01T00:12:20.857ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62452025-03-01T00:12:20.857ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62462025-03-01T00:12:20.858ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62472025-03-01T00:12:20.860ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks?project=springfield-squidport
62482025-03-01T00:12:20.861ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks?project=springfield-squidport
62492025-03-01T00:12:20.861ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62502025-03-01T00:12:20.861ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62512025-03-01T00:12:20.861ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62522025-03-01T00:12:20.864ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks?project=springfield-squidport
62532025-03-01T00:12:20.864ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62542025-03-01T00:12:20.864ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62552025-03-01T00:12:20.864ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62562025-03-01T00:12:20.866ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks?project=springfield-squidport
62572025-03-01T00:12:20.867ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62582025-03-01T00:12:20.868ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62592025-03-01T00:12:20.868ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62602025-03-01T00:12:20.872ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks?project=springfield-squidport
62612025-03-01T00:12:20.883ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62622025-03-01T00:12:20.883ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks?project=springfield-squidport
62632025-03-01T00:12:20.883ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks?project=springfield-squidport
62642025-03-01T00:12:20.883ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62652025-03-01T00:12:20.883ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62662025-03-01T00:12:20.884ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62672025-03-01T00:12:20.889ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks?project=springfield-squidport
62682025-03-01T00:12:20.889ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62692025-03-01T00:12:20.889ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62702025-03-01T00:12:20.889ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62712025-03-01T00:12:20.893ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks?project=springfield-squidport
62722025-03-01T00:12:20.893ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62732025-03-01T00:12:20.893ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62742025-03-01T00:12:20.894ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62752025-03-01T00:12:20.898ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks?project=springfield-squidport
62762025-03-01T00:12:20.906ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62772025-03-01T00:12:20.906ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database uri = /v1/instances/kris-picks?project=springfield-squidport
62782025-03-01T00:12:20.906ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks?project=springfield-squidport
62792025-03-01T00:12:20.908ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae resource = Database result = Ok(()) uri = /v1/instances/kris-picks?project=springfield-squidport
62802025-03-01T00:12:20.910ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 80393 local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 44611c43-a119-4036-a7b0-7dbd5c7a0bae response_code = 200 uri = /v1/instances/kris-picks?project=springfield-squidport
62812025-03-01T00:12:20.911ZINFOtest_instance_serial (external client test context): client received response status = 200
62822025-03-01T00:12:20.911ZINFOtest_instance_serial: registering Oso class class = Action
62832025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = AnyActor
62842025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = AuthenticatedActor
62852025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = BlueprintConfig
62862025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = Database
62872025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = DnsConfig
62882025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = Fleet
62892025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = Inventory
62902025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = IpPoolList
62912025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = ConsoleSessionList
62922025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = DeviceAuthRequestList
62932025-03-01T00:12:20.916ZINFOtest_instance_serial: registering Oso class class = SiloCertificateList
62942025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = SiloIdentityProviderList
62952025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = SiloUserList
62962025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = Project
62972025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = Disk
62982025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = Snapshot
62992025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = ProjectImage
63002025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = Instance
63012025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = IpPool
63022025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = InstanceNetworkInterface
63032025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = Vpc
63042025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = VpcRouter
63052025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = InternetGateway
63062025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = InternetGatewayIpPool
63072025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = InternetGatewayIpAddress
63082025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = RouterRoute
63092025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = VpcSubnet
63102025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = FloatingIp
63112025-03-01T00:12:20.917ZINFOtest_instance_serial: registering Oso class class = Image
63122025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = SiloImage
63132025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = AddressLot
63142025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = Blueprint
63152025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = LoopbackAddress
63162025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = Certificate
63172025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = ConsoleSession
63182025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = DeviceAuthRequest
63192025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = DeviceAccessToken
63202025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = PhysicalDisk
63212025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = Rack
63222025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = RoleBuiltin
63232025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = SshKey
63242025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = Silo
63252025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = SiloUser
63262025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = SiloGroup
63272025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = SupportBundle
63282025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = IdentityProvider
63292025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = SamlIdentityProvider
63302025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = Sled
63312025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = TufRepo
63322025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = TufArtifact
63332025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = Zpool
63342025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = Service
63352025-03-01T00:12:20.918ZINFOtest_instance_serial: registering Oso class class = UserBuiltin
63362025-03-01T00:12:20.919ZINFOtest_instance_serial: full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations)\n# - silo.viewer (can read most resources within the Silo)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n\t"modify" if "modify" on "silo_user";\n}\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(_actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest);\nhas_permission(_actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest);\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n resource RoleBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: RoleBuiltin)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n
63372025-03-01T00:12:20.928ZTRACtest_instance_serial: authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
63382025-03-01T00:12:20.928ZDEBGtest_instance_serial: roles roles = RoleSet { roles: {} }
63392025-03-01T00:12:20.929ZDEBGtest_instance_serial: authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
63402025-03-01T00:12:20.931ZTRACtest_instance_serial: authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
63412025-03-01T00:12:20.931ZDEBGtest_instance_serial: roles roles = RoleSet { roles: {} }
63422025-03-01T00:12:20.932ZDEBGtest_instance_serial: authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
63432025-03-01T00:12:20.934ZTRACtest_instance_serial: authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
63442025-03-01T00:12:20.934ZDEBGtest_instance_serial: roles roles = RoleSet { roles: {} }
63452025-03-01T00:12:20.934ZDEBGtest_instance_serial: authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
63462025-03-01T00:12:20.935ZTRACtest_instance_serial: authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) }
63472025-03-01T00:12:20.936ZTRACtest_instance_serial: loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project
63482025-03-01T00:12:20.936ZTRACtest_instance_serial: authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
63492025-03-01T00:12:20.936ZDEBGtest_instance_serial: roles roles = RoleSet { roles: {} }
63502025-03-01T00:12:20.936ZDEBGtest_instance_serial: authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
63512025-03-01T00:12:20.938ZTRACtest_instance_serial: loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
63522025-03-01T00:12:20.939ZTRACtest_instance_serial: authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
63532025-03-01T00:12:20.939ZDEBGtest_instance_serial: roles roles = RoleSet { roles: {} }
63542025-03-01T00:12:20.939ZDEBGtest_instance_serial: authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
63552025-03-01T00:12:20.941ZTRACtest_instance_serial: loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
63562025-03-01T00:12:20.941ZTRACtest_instance_serial: authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
63572025-03-01T00:12:20.941ZDEBGtest_instance_serial: roles roles = RoleSet { roles: {} }
63582025-03-01T00:12:20.942ZDEBGtest_instance_serial: authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
63592025-03-01T00:12:20.950ZDEBGtest_instance_serial: roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
63602025-03-01T00:12:20.958ZDEBGtest_instance_serial: authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ById(66c3eb55-f1ba-4d92-8a3d-904da1aa2a24) }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ById(e905f321-f9bd-462a-8fa7-37fb1aa527bc) } result = Ok(())
63612025-03-01T00:12:20.959ZTRACtest_instance_serial: authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database
63622025-03-01T00:12:20.959ZDEBGtest_instance_serial: roles roles = RoleSet { roles: {} }
63632025-03-01T00:12:20.959ZDEBGtest_instance_serial: authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) resource = Database result = Ok(())
63642025-03-01T00:12:20.985ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:43509/v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
63652025-03-01T00:12:20.985ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
63662025-03-01T00:12:20.986ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
63672025-03-01T00:12:20.986ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
63682025-03-01T00:12:20.987ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63692025-03-01T00:12:20.987ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
63702025-03-01T00:12:20.987ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63712025-03-01T00:12:20.991ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63722025-03-01T00:12:20.992ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
63732025-03-01T00:12:20.994ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63742025-03-01T00:12:20.997ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
63752025-03-01T00:12:20.997ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
63762025-03-01T00:12:20.997ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63772025-03-01T00:12:20.997ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
63782025-03-01T00:12:20.999ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63792025-03-01T00:12:21.003ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
63802025-03-01T00:12:21.003ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63812025-03-01T00:12:21.003ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
63822025-03-01T00:12:21.004ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63832025-03-01T00:12:21.005ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
63842025-03-01T00:12:21.009ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
63852025-03-01T00:12:21.009ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63862025-03-01T00:12:21.009ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
63872025-03-01T00:12:21.010ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63882025-03-01T00:12:21.012ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
63892025-03-01T00:12:21.012ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
63902025-03-01T00:12:21.012ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63912025-03-01T00:12:21.014ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
63922025-03-01T00:12:21.014ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63932025-03-01T00:12:21.022ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
63942025-03-01T00:12:21.022ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
63952025-03-01T00:12:21.022ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
63962025-03-01T00:12:21.023ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
63972025-03-01T00:12:21.025ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
63982025-03-01T00:12:21.033ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
63992025-03-01T00:12:21.033ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64002025-03-01T00:12:21.033ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64012025-03-01T00:12:21.033ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64022025-03-01T00:12:21.035ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64032025-03-01T00:12:21.042ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64042025-03-01T00:12:21.043ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64052025-03-01T00:12:21.049ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64062025-03-01T00:12:21.055ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64072025-03-01T00:12:21.055ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64082025-03-01T00:12:21.056ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64092025-03-01T00:12:21.058ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64102025-03-01T00:12:21.058ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64112025-03-01T00:12:21.058ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64122025-03-01T00:12:21.058ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64132025-03-01T00:12:21.058ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64142025-03-01T00:12:21.079ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64152025-03-01T00:12:21.079ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64162025-03-01T00:12:21.080ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64172025-03-01T00:12:21.081ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64182025-03-01T00:12:21.085ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64192025-03-01T00:12:21.085ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64202025-03-01T00:12:21.085ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64212025-03-01T00:12:21.089ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64222025-03-01T00:12:21.090ZDEBGtest_instance_serial (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
64232025-03-01T00:12:21.091ZDEBGtest_instance_serial (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c
64242025-03-01T00:12:21.091ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
64252025-03-01T00:12:21.093ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64262025-03-01T00:12:21.109ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64272025-03-01T00:12:21.109ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64282025-03-01T00:12:21.109ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64292025-03-01T00:12:21.109ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64302025-03-01T00:12:21.109ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64312025-03-01T00:12:21.110ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64322025-03-01T00:12:21.111ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 2 table_name = fields_string
64332025-03-01T00:12:21.111ZTRACtest_instance_serial (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
64342025-03-01T00:12:21.115ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64352025-03-01T00:12:21.115ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64362025-03-01T00:12:21.115ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64372025-03-01T00:12:21.116ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64382025-03-01T00:12:21.119ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64392025-03-01T00:12:21.119ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64402025-03-01T00:12:21.119ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64412025-03-01T00:12:21.125ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64422025-03-01T00:12:21.126ZDEBGtest_instance_serial (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = 46c7197b-e099-494b-a693-296ecb919b0c n_rows = 1 table_name = measurements_i64
64432025-03-01T00:12:21.126ZTRACtest_instance_serial (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
64442025-03-01T00:12:21.129ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64452025-03-01T00:12:21.146ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64462025-03-01T00:12:21.146ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64472025-03-01T00:12:21.146ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64482025-03-01T00:12:21.147ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64492025-03-01T00:12:21.218ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:36473 remote_addr = [::1]:49990
64502025-03-01T00:12:21.218ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:36473 method = GET remote_addr = [::1]:49990 req_id = bcfbb381-2a05-4e03-80b3-5428dc09c37e uri = /instance/serial/history?from_start=0
64512025-03-01T00:12:21.219ZINFOtest_instance_serial (dropshot): request completed latency_us = 323 local_addr = [::1]:36473 method = GET remote_addr = [::1]:49990 req_id = bcfbb381-2a05-4e03-80b3-5428dc09c37e response_code = 200 uri = /instance/serial/history?from_start=0
64522025-03-01T00:12:21.220ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 235125 local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 878a7ad6-0b6c-4aae-9aee-ab5c817ad355 response_code = 200 uri = /v1/instances/kris-picks/serial-console?project=springfield-squidport&from_start=0
64532025-03-01T00:12:21.221ZINFOtest_instance_serial (external client test context): client received response status = 200
64542025-03-01T00:12:21.221ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:43509/v1/instances/kris-picks/stop?project=springfield-squidport
64552025-03-01T00:12:21.222ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64562025-03-01T00:12:21.222ZTRACtest_instance_serial (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64572025-03-01T00:12:21.222ZDEBGtest_instance_serial (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64582025-03-01T00:12:21.222ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
64592025-03-01T00:12:21.222ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
64602025-03-01T00:12:21.223ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
64612025-03-01T00:12:21.225ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
64622025-03-01T00:12:21.226ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
64632025-03-01T00:12:21.226ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
64642025-03-01T00:12:21.228ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
64652025-03-01T00:12:21.228ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
64662025-03-01T00:12:21.228ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
64672025-03-01T00:12:21.228ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
64682025-03-01T00:12:21.230ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
64692025-03-01T00:12:21.240ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
64702025-03-01T00:12:21.241ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
64712025-03-01T00:12:21.241ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
64722025-03-01T00:12:21.242ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
64732025-03-01T00:12:21.245ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
64742025-03-01T00:12:21.248ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007, lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
64752025-03-01T00:12:21.248ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
64762025-03-01T00:12:21.249ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
64772025-03-01T00:12:21.249ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
64782025-03-01T00:12:21.251ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
64792025-03-01T00:12:21.251ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
64802025-03-01T00:12:21.251ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
64812025-03-01T00:12:21.252ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
64822025-03-01T00:12:21.252ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
64832025-03-01T00:12:21.254ZTRACtest_instance_serial (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
64842025-03-01T00:12:21.254ZTRACtest_instance_serial (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database
64852025-03-01T00:12:21.255ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {} }
64862025-03-01T00:12:21.256ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Database result = Ok(())
64872025-03-01T00:12:21.258ZDEBGtest_instance_serial (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
64882025-03-01T00:12:21.261ZDEBGtest_instance_serial (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003, .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
64892025-03-01T00:12:21.261ZTRACtest_instance_serial (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64902025-03-01T00:12:21.261ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64912025-03-01T00:12:21.261ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64922025-03-01T00:12:21.262ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64932025-03-01T00:12:21.265ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64942025-03-01T00:12:21.265ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64952025-03-01T00:12:21.266ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64962025-03-01T00:12:21.268ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64972025-03-01T00:12:21.269ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64982025-03-01T00:12:21.270ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
64992025-03-01T00:12:21.292ZTRACtest_instance_serial (dropshot_external): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65002025-03-01T00:12:21.293ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65012025-03-01T00:12:21.293ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65022025-03-01T00:12:21.293ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65032025-03-01T00:12:21.294ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65042025-03-01T00:12:21.297ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65052025-03-01T00:12:21.297ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65062025-03-01T00:12:21.298ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65072025-03-01T00:12:21.298ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65082025-03-01T00:12:21.304ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65092025-03-01T00:12:21.304ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65102025-03-01T00:12:21.304ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65112025-03-01T00:12:21.305ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65122025-03-01T00:12:21.309ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65132025-03-01T00:12:21.330ZDEBGtest_instance_serial (dropshot_external): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65142025-03-01T00:12:21.330ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65152025-03-01T00:12:21.331ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65162025-03-01T00:12:21.331ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65172025-03-01T00:12:21.331ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65182025-03-01T00:12:21.332ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65192025-03-01T00:12:21.341ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65202025-03-01T00:12:21.341ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65212025-03-01T00:12:21.342ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65222025-03-01T00:12:21.354ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65232025-03-01T00:12:21.359ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65242025-03-01T00:12:21.359ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65252025-03-01T00:12:21.360ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65262025-03-01T00:12:21.362ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65272025-03-01T00:12:21.366ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65282025-03-01T00:12:21.399ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65292025-03-01T00:12:21.402ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65302025-03-01T00:12:21.402ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65312025-03-01T00:12:21.402ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65322025-03-01T00:12:21.403ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
65332025-03-01T00:12:21.404ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
65342025-03-01T00:12:21.404ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
65352025-03-01T00:12:21.410ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
65362025-03-01T00:12:21.410ZTRACtest_instance_serial (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
65372025-03-01T00:12:21.410ZTRACtest_instance_serial (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database
65382025-03-01T00:12:21.410ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {} }
65392025-03-01T00:12:21.411ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Database result = Ok(())
65402025-03-01T00:12:21.415ZDEBGtest_instance_serial (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
65412025-03-01T00:12:21.425ZDEBGtest_instance_serial (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead, .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229, lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
65422025-03-01T00:12:21.510ZDEBGtest_instance_serial (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
65432025-03-01T00:12:21.510ZINFOtest_instance_serial (dropshot): accepted connection local_addr = [::1]:38105 remote_addr = [::1]:50058 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
65442025-03-01T00:12:21.511ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50058 req_id = b12bd6a9-49e0-4728-87a2-36df425a5f37 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
65452025-03-01T00:12:21.512ZTRACtest_instance_serial (dropshot): incoming request local_addr = [::1]:36473 method = PUT remote_addr = [::1]:49988 req_id = b0c7abb6-9d25-4edd-af76-9d9bffb97238 uri = /instance/state
65462025-03-01T00:12:21.512ZINFOtest_instance_serial (dropshot): request completed latency_us = 314 local_addr = [::1]:36473 method = PUT remote_addr = [::1]:49988 req_id = b0c7abb6-9d25-4edd-af76-9d9bffb97238 response_code = 204 uri = /instance/state
65472025-03-01T00:12:21.512ZINFOtest_instance_serial (SledAgent): transition action = None current = SledVmmState { vmm_state: VmmRuntimeState { state: Stopping, gen: Generation(4), time_updated: 2025-03-01T00:12:21.512424434Z }, migration_in: None, migration_out: None } desired = Some(Stopped) dropped = None id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a kind = instances server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 target = Stopped
65482025-03-01T00:12:21.512ZINFOtest_instance_serial (dropshot): request completed latency_us = 1530 local_addr = [::1]:38105 method = PUT remote_addr = [::1]:50058 req_id = b12bd6a9-49e0-4728-87a2-36df425a5f37 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state
65492025-03-01T00:12:21.512ZDEBGtest_instance_serial (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:38105/vmms/f740b115-3538-4eb5-ab0f-8a0893e1ff8a/state", status: 200, headers: {"content-type": "application/json", "x-request-id": "b12bd6a9-49e0-4728-87a2-36df425a5f37", "content-length": "151", "date": "Sat, 01 Mar 2025 00:12:20 GMT"} })
65502025-03-01T00:12:21.513ZINFOtest_instance_serial (dropshot_external): received new VMM runtime state from sled agent actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST migration_state = Migrations { migration_in: None, migration_out: None } propolis_id = f740b115-3538-4eb5-ab0f-8a0893e1ff8a remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 uri = /v1/instances/kris-picks/stop?project=springfield-squidport vmm_state = VmmRuntimeState { state: Stopping, gen: Generation(4), time_updated: 2025-03-01T00:12:21.512424434Z }
65512025-03-01T00:12:21.513ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65522025-03-01T00:12:21.513ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65532025-03-01T00:12:21.514ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65542025-03-01T00:12:21.560ZTRACtest_instance_serial (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65552025-03-01T00:12:21.560ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24 resource_type = Project uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65562025-03-01T00:12:21.560ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65572025-03-01T00:12:21.561ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65582025-03-01T00:12:21.562ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65592025-03-01T00:12:21.566ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65602025-03-01T00:12:21.566ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65612025-03-01T00:12:21.566ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65622025-03-01T00:12:21.566ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65632025-03-01T00:12:21.569ZTRACtest_instance_serial (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. } actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65642025-03-01T00:12:21.569ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65652025-03-01T00:12:21.570ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65662025-03-01T00:12:21.570ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65672025-03-01T00:12:21.576ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65682025-03-01T00:12:21.582ZDEBGtest_instance_serial (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Instance { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 66c3eb55-f1ba-4d92-8a3d-904da1aa2a24, lookup_type: ByName("springfield-squidport") }, key: e905f321-f9bd-462a-8fa7-37fb1aa527bc, lookup_type: ByName("kris-picks") } result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65692025-03-01T00:12:21.582ZTRACtest_instance_serial (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65702025-03-01T00:12:21.583ZDEBGtest_instance_serial (dropshot_external): roles actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 roles = RoleSet { roles: {} } uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65712025-03-01T00:12:21.584ZDEBGtest_instance_serial (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007, silo_id: 001de000-5110-4000-8000-000000000000, .. }) actor_id = 001de000-05e4-4000-8000-000000004007 authenticated = true local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 resource = Database result = Ok(()) uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65722025-03-01T00:12:21.587ZINFOtest_instance_serial (dropshot_external): request completed latency_us = 365271 local_addr = 127.0.0.1:43509 method = POST remote_addr = 127.0.0.1:54780 req_id = 876212c9-d07c-4266-aac5-5d550eb806b2 response_code = 202 uri = /v1/instances/kris-picks/stop?project=springfield-squidport
65732025-03-01T00:12:21.593ZINFOtest_instance_serial (external client test context): client received response status = 202
65742025-03-01T00:12:21.593ZINFOtest_instance_serial (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:43509/v1/instances/kris-picks/serial-console/stream?project=springfield-squidport
65752025-03-01T00:12:21.593ZTRACtest_instance_serial (dropshot_external): incoming request local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 92992c9b-7e4e-4cf6-9604-3e48681e7272 uri = /v1/instances/kris-picks/serial-console/stream?project=springfield-squidport
65762025-03-01T00:12:21.593ZINFOtest_instance_serial (dropshot_external): request completed error_message_external = expected connection upgrade error_message_internal = expected connection upgrade latency_us = 296 local_addr = 127.0.0.1:43509 method = GET remote_addr = 127.0.0.1:54780 req_id = 92992c9b-7e4e-4cf6-9604-3e48681e7272 response_code = 400 uri = /v1/instances/kris-picks/serial-console/stream?project=springfield-squidport
65772025-03-01T00:12:21.593ZINFOtest_instance_serial (external client test context): client received response status = 400