| 1 | 2026-01-14T21:22:28.533Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_crdb
|
| 2 | 2026-01-14T21:22:28.534Z | DEBG | test_vpc_firewall: Starting CRDB
|
| 3 | 2026-01-14T21:22:28.575Z | INFO | test_vpc_firewall: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpXmydPk
|
| 4 | 2026-01-14T21:22:28.575Z | INFO | test_vpc_firewall: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/25f7937f9ad789fdb3d5fe26603ea7bfc6d229e3bf5587ce4ec009504e11060b.tar) to storage directory (/var/tmp/omicron_tmp/.tmpXmydPk/data)
|
| 5 | 2026-01-14T21:22:28.606Z | INFO | test_vpc_firewall: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpXmydPk/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpXmydPk/listen-url
|
| 6 | 2026-01-14T21:22:28.607Z | INFO | test_vpc_firewall: cockroach environment: BUILDOMAT_JOB_ID=01KEYW6ZBWM4QEBSCMRX4P2GHN BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/25f7937f9ad789fdb3d5fe26603ea7bfc6d229e3bf5587ce4ec009504e11060b.tar GITHUB_BRANCH=iliana/cockroach-in-switch-zone GITHUB_REF=refs/heads/iliana/cockroach-in-switch-zone GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=cdd1d4ed932c03acff05ce286f9dcc941c035089 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-e269a799996cc73d/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-f08b403ebfa90352/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-8dc5be0faba5452c/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-4ac38c1702e3f2b5/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-b9d704b8d20089f7/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6a545a93d51cd40e/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-0b430c6eb1c88682/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-e269a799996cc73d/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-f08b403ebfa90352/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-8dc5be0faba5452c/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-4ac38c1702e3f2b5/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-b9d704b8d20089f7/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6a545a93d51cd40e/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-0b430c6eb1c88682/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib NEXTEST_PROFILE=ci NEXTEST_RUN_ID=44093501-f026-4d9b-8fd1-a071d6ae713f NEXTEST_TEST_GLOBAL_SLOT=5 NEXTEST_TEST_GROUP=@global NEXTEST_TEST_GROUP_SLOT=none NEXTEST_TEST_PHASE=run OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-0f0e157a700d2316/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=--cfg tokio_unstable -D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.91.1-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime __NEXTEST_ATTEMPT=1
|
| 7 | 2026-01-14T21:22:30.339Z | INFO | test_vpc_firewall: cockroach pid: 5078
|
| 8 | 2026-01-14T21:22:30.339Z | INFO | test_vpc_firewall: cockroach listen URL: postgresql://root@[::1]:46432/omicron?sslmode=disable
|
| 9 | 2026-01-14T21:22:30.354Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_clickhouse
|
| 10 | 2026-01-14T21:22:30.354Z | DEBG | test_vpc_firewall: Starting Clickhouse
|
| 11 | 2026-01-14T21:22:30.978Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_internal_dns
|
| 12 | 2026-01-14T21:22:30.978Z | INFO | test_vpc_firewall (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpJParZw
|
| 13 | 2026-01-14T21:22:31.111Z | INFO | test_vpc_firewall (store): pruning trees for generations newer than 0
|
| 14 | 2026-01-14T21:22:31.111Z | INFO | test_vpc_firewall (store): pruning trees for generations older than 0
keep = 3
|
| 15 | 2026-01-14T21:22:31.112Z | INFO | test_vpc_firewall (dns): DNS server bound to address
kind = dns
local_address = [::1]:51352
|
| 16 | 2026-01-14T21:22:31.113Z | DEBG | test_vpc_firewall (http): registered endpoint
kind = dns
local_addr = [::1]:43592
method = GET
path = /config
versions = from 1.0.0 to 2.0.0
|
| 17 | 2026-01-14T21:22:31.113Z | DEBG | test_vpc_firewall (http): registered endpoint
kind = dns
local_addr = [::1]:43592
method = GET
path = /config
versions = all starting from 2.0.0
|
| 18 | 2026-01-14T21:22:31.113Z | DEBG | test_vpc_firewall (http): registered endpoint
kind = dns
local_addr = [::1]:43592
method = PUT
path = /config
versions = from 1.0.0 to 2.0.0
|
| 19 | 2026-01-14T21:22:31.113Z | DEBG | test_vpc_firewall (http): registered endpoint
kind = dns
local_addr = [::1]:43592
method = PUT
path = /config
versions = all starting from 2.0.0
|
| 20 | 2026-01-14T21:22:31.113Z | INFO | test_vpc_firewall (http): listening
kind = dns
local_addr = [::1]:43592
|
| 21 | 2026-01-14T21:22:31.119Z | DEBG | test_vpc_firewall (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:43592
|
| 22 | 2026-01-14T21:22:31.120Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_external_dns
|
| 23 | 2026-01-14T21:22:31.120Z | INFO | test_vpc_firewall (store): opening sled database
path = /var/tmp/omicron_tmp/.tmpmMxcVK
|
| 24 | 2026-01-14T21:22:31.132Z | INFO | test_vpc_firewall (store): pruning trees for generations newer than 0
|
| 25 | 2026-01-14T21:22:31.132Z | INFO | test_vpc_firewall (store): pruning trees for generations older than 0
keep = 3
|
| 26 | 2026-01-14T21:22:31.132Z | INFO | test_vpc_firewall (dns): DNS server bound to address
kind = dns
local_address = [::1]:36169
|
| 27 | 2026-01-14T21:22:31.132Z | DEBG | test_vpc_firewall (http): registered endpoint
kind = dns
local_addr = [::1]:41277
method = GET
path = /config
versions = from 1.0.0 to 2.0.0
|
| 28 | 2026-01-14T21:22:31.132Z | DEBG | test_vpc_firewall (http): registered endpoint
kind = dns
local_addr = [::1]:41277
method = GET
path = /config
versions = all starting from 2.0.0
|
| 29 | 2026-01-14T21:22:31.132Z | DEBG | test_vpc_firewall (http): registered endpoint
kind = dns
local_addr = [::1]:41277
method = PUT
path = /config
versions = from 1.0.0 to 2.0.0
|
| 30 | 2026-01-14T21:22:31.132Z | DEBG | test_vpc_firewall (http): registered endpoint
kind = dns
local_addr = [::1]:41277
method = PUT
path = /config
versions = all starting from 2.0.0
|
| 31 | 2026-01-14T21:22:31.132Z | INFO | test_vpc_firewall (http): listening
kind = dns
local_addr = [::1]:41277
|
| 32 | 2026-01-14T21:22:31.136Z | DEBG | test_vpc_firewall (http): successfully registered DTrace USDT probes
kind = dns
local_addr = [::1]:41277
|
| 33 | 2026-01-14T21:22:31.137Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_nexus_internal
|
| 34 | 2026-01-14T21:22:31.153Z | DEBG | test_vpc_firewall: Starting Nexus (internal API)
|
| 35 | 2026-01-14T21:22:31.154Z | INFO | test_vpc_firewall: setting up nexus server
|
| 36 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Action
|
| 37 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = AuditLog
|
| 38 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = AnyActor
|
| 39 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = AuthenticatedActor
|
| 40 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = BlueprintConfig
|
| 41 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Database
|
| 42 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = DnsConfig
|
| 43 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Fleet
|
| 44 | 2026-01-14T21:22:31.156Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Inventory
|
| 45 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = IpPoolList
|
| 46 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = VpcList
|
| 47 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = ConsoleSessionList
|
| 48 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = DeviceAuthRequestList
|
| 49 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = QuiesceState
|
| 50 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloCertificateList
|
| 51 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloGroupList
|
| 52 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloIdentityProviderList
|
| 53 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloUserList
|
| 54 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloUserSessionList
|
| 55 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloUserTokenList
|
| 56 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = UpdateTrustRootList
|
| 57 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = TargetReleaseConfig
|
| 58 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = AlertClassList
|
| 59 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = ScimClientBearerTokenList
|
| 60 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = MulticastGroupList
|
| 61 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Project
|
| 62 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Disk
|
| 63 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Snapshot
|
| 64 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = ProjectImage
|
| 65 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = AffinityGroup
|
| 66 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = AntiAffinityGroup
|
| 67 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Instance
|
| 68 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = IpPool
|
| 69 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = InstanceNetworkInterface
|
| 70 | 2026-01-14T21:22:31.157Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Vpc
|
| 71 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = VpcRouter
|
| 72 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = InternetGateway
|
| 73 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = InternetGatewayIpPool
|
| 74 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = InternetGatewayIpAddress
|
| 75 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = RouterRoute
|
| 76 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = VpcSubnet
|
| 77 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = FloatingIp
|
| 78 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Image
|
| 79 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloImage
|
| 80 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = AddressLot
|
| 81 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Blueprint
|
| 82 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = LoopbackAddress
|
| 83 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Certificate
|
| 84 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = ConsoleSession
|
| 85 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = DeviceAuthRequest
|
| 86 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = DeviceAccessToken
|
| 87 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = PhysicalDisk
|
| 88 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Rack
|
| 89 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SshKey
|
| 90 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Silo
|
| 91 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloUser
|
| 92 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SiloGroup
|
| 93 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SupportBundle
|
| 94 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = IdentityProvider
|
| 95 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = SamlIdentityProvider
|
| 96 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Sled
|
| 97 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = TufRepo
|
| 98 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = TufArtifact
|
| 99 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = TufTrustRoot
|
| 100 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Alert
|
| 101 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = AlertReceiver
|
| 102 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = WebhookSecret
|
| 103 | 2026-01-14T21:22:31.158Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Zpool
|
| 104 | 2026-01-14T21:22:31.159Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = Service
|
| 105 | 2026-01-14T21:22:31.159Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = UserBuiltin
|
| 106 | 2026-01-14T21:22:31.159Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = ScimClientBearerToken
|
| 107 | 2026-01-14T21:22:31.159Z | INFO | test_vpc_firewall (ServerContext): registering Oso class
class = MulticastGroup
|
| 108 | 2026-01-14T21:22:31.159Z | INFO | test_vpc_firewall (ServerContext): full Oso configuration
config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations; grants project.admin on all projects)\n# - silo.limited-collaborator (grants project.limited-collaborator on all projects)\n# - silo.viewer (can read most resources within the Silo; grants project.viewer)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project, including networking)\n# - project.limited-collaborator (can manage compute resources, but not networking resources)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\n# Note that certain Actors may not ever have any roles assigned to them, like\n# SCIM Actors.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif actor.is_user and silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t# Role hierarchy: admin > collaborator > limited-collaborator > viewer\n\t#\n\t# The "limited-collaborator" role can create/modify non-networking\n\t# resources (instances, disks, etc.) but cannot create/modify networking\n\t# infrastructure (VPCs, subnets, routers, internet gateways).\n\t# See nexus/authz-macros for InProjectLimited vs InProjectFull.\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "limited-collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"limited-collaborator" if "limited-collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_user and silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n}\n# We want to allow the user to modify the ssh key but disallow a SCIM IdP token\n# from doing the same.\nhas_permission(actor: AuthenticatedActor, "modify", ssh_key: SshKey)\n\tif actor.is_user and has_permission(actor, "modify", ssh_key.silo_user);\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource ScimClientBearerToken {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n # necessary to authenticate SCIM actors\n\t"read" if "external-authenticator" on "parent_fleet";\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token: ScimClientBearerToken)\n\tif scim_client_bearer_token.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerToken)\n\tif collection.silo.fleet = fleet;\n\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the quiesce state of a particular Nexus instance.\n#\n# These authz checks must not require the database. We grant this directly to\n# callers of the internal API.\nresource QuiesceState {\n\tpermissions = [ "read", "modify" ];\n}\nhas_permission(USER_INTERNAL_API: AuthenticatedActor, "read", _q: QuiesceState);\nhas_permission(\n USER_INTERNAL_API: AuthenticatedActor,\n "modify",\n _q: QuiesceState\n);\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/update/trust-roots" in the API\nresource UpdateTrustRootList {\n\tpermissions = [ "list_children", "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"list_children" if "viewer" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: UpdateTrustRootList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource TargetReleaseConfig {\n\tpermissions = [\n\t "read", # read the current target release\n\t "modify", # change the current target release\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", resource: TargetReleaseConfig)\n\tif resource.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif actor.is_user and silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for accessing "/v1/multicast-groups" in the API\nresource MulticastGroupList {\n\tpermissions = [\n\t "list_children",\n\t "create_child",\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t# Fleet Administrators can create multicast groups\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list multicast groups\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group_list: MulticastGroupList)\n\tif multicast_group_list.fleet = fleet;\n\n# Any authenticated user can create multicast groups in their fleet.\n# This is necessary to allow silo users to create multicast groups for\n# cross-project and cross-silo communication without requiring Fleet::Admin.\nhas_permission(actor: AuthenticatedActor, "create_child", multicast_group_list: MulticastGroupList)\n\tif silo in actor.silo and silo.fleet = multicast_group_list.fleet;\n\n# Any authenticated user can list multicast groups in their fleet.\n# This is necessary because multicast groups are fleet-scoped resources that\n# silo users need to discover and attach their instances to, without requiring\n# Fleet::Viewer role.\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group_list: MulticastGroupList)\n\tif silo in actor.silo and silo.fleet = multicast_group_list.fleet;\n\n# Any authenticated user can read and modify individual multicast groups in their fleet.\n# Users can create, modify, and consume (attach instances to) multicast groups.\n# This enables cross-project and cross-silo multicast while maintaining\n# appropriate security boundaries via API authorization and underlay group\n# membership validation.\nhas_permission(actor: AuthenticatedActor, "read", multicast_group: MulticastGroup)\n\tif silo in actor.silo and silo.fleet = multicast_group.fleet;\n\nhas_permission(actor: AuthenticatedActor, "modify", multicast_group: MulticastGroup)\n\tif silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Describes the policy for reading and writing the audit log\nresource AuditLog {\n\tpermissions = [\n\t "list_children", # retrieve audit log\n\t "create_child", # create audit log entry\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet viewers can read the audit log\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\n# Any actor should be able to write to the audit log because we need to be able\n# to write to the log from any request, authenticated or not. Audit log writes\n# are always a byproduct of other operations: there are no endpoints that allow\n# the user to write to the log deliberately. Note we use AuthenticatedActor\n# because we don't really mean unauthenticated -- in the case of login\n# operations, we use the external authenticator actor that creates the session\n# to authorize the audit log write.\nhas_permission(_actor: AuthenticatedActor, "create_child", _audit_log: AuditLog);\n\nhas_relation(fleet: Fleet, "parent_fleet", audit_log: AuditLog)\n\tif audit_log.fleet = fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Allow silo admins to delete and list user sessions\nresource SiloUserSessionList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's sessions.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's sessions.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserSessionList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own sessions\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Allow silo admins to delete and list user access tokens\nresource SiloUserTokenList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's tokens.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's tokens.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserTokenList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own tokens\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on users.\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_user_list: SiloUserList)\n\tif actor.is_scim_idp and silo_user_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_user: SiloUser)\n\tif actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_user_list: SiloUserList)\n if actor.is_scim_idp and silo_user_list.silo in actor.silo;\n\n# Describes the policy for creating and managing Silo groups (mostly intended\n# for API-managed groups)\nresource SiloGroupList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the groups in the\n\t# Silo) can see the groups in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's groups. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloGroupList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloGroupList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on groups.\nhas_permission(actor: AuthenticatedActor, "read", silo_group: SiloGroup)\n if actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_group_list: SiloGroupList)\n\tif actor.is_scim_idp and silo_group_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_group: SiloGroup)\n\tif actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_group_list: SiloGroupList)\n if actor.is_scim_idp and silo_group_list.silo in actor.silo;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest)\n if actor.is_user;\nhas_permission(actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest)\n if actor.is_user;\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\nresource WebhookSecret {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_alert_receiver: AlertReceiver };\n\n\t"read" if "read" on "parent_alert_receiver";\n\t"modify" if "modify" on "parent_alert_receiver";\n}\n\nhas_relation(rx: AlertReceiver, "parent_alert_receiver", secret: WebhookSecret)\n\tif secret.alert_receiver = rx;\n\nresource AlertClassList {\n\tpermissions = [ "list_children" ];\n\trelations = { parent_fleet: Fleet };\n\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", collection: AlertClassList)\n\tif collection.fleet = fleet;\n\nresource ScimClientBearerTokenList {\n\tpermissions = [ "create_child", "list_children" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n # These are all admin because being able to create these tokens would allow\n # a user to grant themselves admin by modifying group membership through SCIM calls\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_silo";\n\n # Fleet-level roles also grant privileges for SCIM client tokens, for\n # configuration before silo admins are present.\n\t"create_child" if "admin" on "parent_fleet";\n\t"list_children" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token_list: ScimClientBearerTokenList)\n\tif scim_client_bearer_token_list.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerTokenList)\n\tif collection.silo.fleet = fleet;\n\n# VpcList is a synthetic resource for controlling VPC creation.\n# Unlike other project resources, VPC creation requires the full "collaborator"\n# role rather than "limited-collaborator", enforcing the networking restriction.\n# This allows organizations to restrict who can reconfigure the network topology\n# while still allowing users with limited-collaborator to work with compute\n# resources (instances, disks, etc.) within the existing network.\nresource VpcList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { containing_project: Project };\n\n\t"list_children" if "read" on "containing_project";\n\t"create_child" if "collaborator" on "containing_project";\n}\nhas_relation(project: Project, "containing_project", collection: VpcList)\n\tif collection.project = project;\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource AffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AffinityGroup)\n if child.project = parent;\n \n\n resource AntiAffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AntiAffinityGroup)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource TufTrustRoot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufTrustRoot)\n if child.fleet = fleet;\n \n\n resource Alert {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Alert)\n if child.fleet = fleet;\n \n\n resource AlertReceiver {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AlertReceiver)\n if child.fleet = fleet;\n \n\n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n \n\n\n resource MulticastGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: MulticastGroup)\n if child.fleet = fleet;\n
|
| 109 | 2026-01-14T21:22:31.200Z | INFO | test_vpc_firewall (ServerContext): Setting up resolver using DNS address: [::1]:51352
|
| 110 | 2026-01-14T21:22:31.200Z | INFO | test_vpc_firewall (DnsResolver): new DNS resolver
addresses = [[::1]:51352]
|
| 111 | 2026-01-14T21:22:31.202Z | INFO | test_vpc_firewall (ServerContext): Setting up qorb database pool from a single host
url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:46432/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 46432,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n load_balance_hosts: Disable,\n },\n}
|
| 112 | 2026-01-14T21:22:31.206Z | DEBG | test_vpc_firewall (ServerContext): registered USDT probes
|
| 113 | 2026-01-14T21:22:33.220Z | INFO | test_vpc_firewall (datastore): Database schema version is up to date
desired_version = 215.0.0
found_version = 215.0.0
|
| 114 | 2026-01-14T21:22:33.239Z | WARN | test_vpc_firewall (datastore): No db_metadata_nexus records exist - skipping access check
explanation = This is expected during initial deployment or before migration
nexus_id = 913233fe-92a8-4635-9572-183f495429c4 (omicron_zone)
|
| 115 | 2026-01-14T21:22:33.239Z | INFO | test_vpc_firewall (nexus): Datastore is ready for usage
|
| 116 | 2026-01-14T21:22:33.364Z | DEBG | test_vpc_firewall (clickhouse-client): registered USDT probes
id = ba4222a0-3d7c-4181-9157-e0113d70bad4
|
| 117 | 2026-01-14T21:22:33.458Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request
versions = all
|
| 118 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped
versions = all
|
| 119 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress
versions = all
|
| 120 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-finish
versions = all
|
| 121 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /crucible/0/upstairs/{upstairs_id}/repair-start
versions = all
|
| 122 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /disk/{disk_id}/remove-read-only-parent
versions = all
|
| 123 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = PUT
path = /disks/{disk_id}
versions = all
|
| 124 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /metrics/collectors
versions = all
|
| 125 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = GET
path = /metrics/collectors/{collector_id}/producers
versions = all
|
| 126 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /metrics/producers
versions = all
|
| 127 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = GET
path = /nat/ipv4/changeset/{from_gen}
versions = all
|
| 128 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = GET
path = /probes/{sled}
versions = all
|
| 129 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /refresh-vpc-routes
versions = all
|
| 130 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = GET
path = /sled-agents/{sled_id}
versions = all
|
| 131 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /sled-agents/{sled_id}
versions = all
|
| 132 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = PUT
path = /switch/{switch_id}
versions = all
|
| 133 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = GET
path = /v1/ping
versions = all
|
| 134 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = PUT
path = /vmms/{propolis_id}
versions = all
|
| 135 | 2026-01-14T21:22:33.459Z | DEBG | test_vpc_firewall (dropshot_internal): registered endpoint
local_addr = 127.0.0.1:45286
method = POST
path = /volume/{volume_id}/remove-read-only-parent
versions = all
|
| 136 | 2026-01-14T21:22:33.460Z | INFO | test_vpc_firewall (dropshot_internal): listening
local_addr = 127.0.0.1:45286
|
| 137 | 2026-01-14T21:22:33.461Z | DEBG | test_vpc_firewall (dropshot_internal): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:45286
|
| 138 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /bgtasks
versions = all
|
| 139 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /bgtasks/activate
versions = all
|
| 140 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /bgtasks/view/{bgtask_name}
versions = all
|
| 141 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /clickhouse/policy
versions = all
|
| 142 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /clickhouse/policy
versions = all
|
| 143 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /debug/fetch-omdb-binary
versions = all
|
| 144 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /demo-saga
versions = all
|
| 145 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /demo-saga/{demo_saga_id}/complete
versions = all
|
| 146 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /deployment/blueprints/all
versions = all
|
| 147 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = DELETE
path = /deployment/blueprints/all/{blueprint_id}
versions = all
|
| 148 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /deployment/blueprints/all/{blueprint_id}
versions = all
|
| 149 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /deployment/blueprints/import
versions = all
|
| 150 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /deployment/blueprints/regenerate
versions = all
|
| 151 | 2026-01-14T21:22:33.470Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /deployment/blueprints/target
versions = all
|
| 152 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /deployment/blueprints/target
versions = all
|
| 153 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = PUT
path = /deployment/blueprints/target/enabled
versions = all
|
| 154 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /deployment/reconfigurator-config
versions = all
|
| 155 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /deployment/reconfigurator-config
versions = all
|
| 156 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /deployment/reconfigurator-config/{version}
versions = all
|
| 157 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /deployment/update-status
versions = all
|
| 158 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 159 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 160 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 161 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 162 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 163 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 164 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 165 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 166 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 167 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 168 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /instances/{instance_id}/migrate
versions = all
|
| 169 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /mgs-updates
versions = all
|
| 170 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /oximeter/read-policy
versions = all
|
| 171 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /oximeter/read-policy
versions = all
|
| 172 | 2026-01-14T21:22:33.471Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /physical-disk/expunge
versions = all
|
| 173 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /quiesce
versions = all
|
| 174 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /quiesce
versions = all
|
| 175 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = PUT
path = /racks/{rack_id}/initialization-complete
versions = all
|
| 176 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /sagas
versions = all
|
| 177 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /sagas/{saga_id}
versions = all
|
| 178 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /sleds/add
versions = all
|
| 179 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = POST
path = /sleds/expunge
versions = all
|
| 180 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /sleds/uninitialized
versions = all
|
| 181 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): registered endpoint
local_addr = 127.0.0.1:36202
method = GET
path = /v1/ping
versions = all
|
| 182 | 2026-01-14T21:22:33.472Z | INFO | test_vpc_firewall (dropshot_lockstep): listening
local_addr = 127.0.0.1:36202
|
| 183 | 2026-01-14T21:22:33.472Z | DEBG | test_vpc_firewall (dropshot_lockstep): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:36202
|
| 184 | 2026-01-14T21:22:33.473Z | INFO | test_vpc_firewall (SEC): SEC running
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 185 | 2026-01-14T21:22:33.475Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 186 | 2026-01-14T21:22:33.475Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 187 | 2026-01-14T21:22:33.479Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 188 | 2026-01-14T21:22:33.479Z | DEBG | test_vpc_firewall (DataLoader): attempting to create built-in users
|
| 189 | 2026-01-14T21:22:33.481Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 190 | 2026-01-14T21:22:33.481Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 191 | 2026-01-14T21:22:33.482Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 192 | 2026-01-14T21:22:33.921Z | INFO | test_vpc_firewall (MgsUpdateDriver): starting MgsUpdateDriver
|
| 193 | 2026-01-14T21:22:33.935Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: c4 38 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .8..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:56004
req_id = ec636ebb-e618-4471-89e1-33388b11a51d
|
| 194 | 2026-01-14T21:22:33.937Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 50232,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:56004
req_id = ec636ebb-e618-4471-89e1-33388b11a51d
|
| 195 | 2026-01-14T21:22:33.938Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 50232,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:56004
req_id = ec636ebb-e618-4471-89e1-33388b11a51d
|
| 196 | 2026-01-14T21:22:33.940Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 74 (0x4a) bytes\n0000: 81 a9 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 ............._re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........
kind = dns
peer_addr = [::1]:64613
req_id = a8e985ef-ef7c-41c4-a4f3-8af84881e6c7
|
| 197 | 2026-01-14T21:22:33.940Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 33193,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:64613
req_id = a8e985ef-ef7c-41c4-a4f3-8af84881e6c7
|
| 198 | 2026-01-14T21:22:33.941Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 33193,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_repo-depot._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_repo-depot._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
11,
95,
114,
101,
112,
111,
45,
100,
101,
112,
111,
116,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_repo-depot._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:64613
req_id = a8e985ef-ef7c-41c4-a4f3-8af84881e6c7
|
| 199 | 2026-01-14T21:22:33.941Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 79 (0x4f) bytes\n0000: a6 b4 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........
kind = dns
peer_addr = [::1]:60102
req_id = c3e92fae-4891-40ba-9ea5-266ce9334c05
|
| 200 | 2026-01-14T21:22:33.941Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 42676,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:60102
req_id = c3e92fae-4891-40ba-9ea5-266ce9334c05
|
| 201 | 2026-01-14T21:22:33.943Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 42676,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_crucible-pantry._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
16,
95,
99,
114,
117,
99,
105,
98,
108,
101,
45,
112,
97,
110,
116,
114,
121,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:60102
req_id = c3e92fae-4891-40ba-9ea5-266ce9334c05
|
| 202 | 2026-01-14T21:22:33.944Z | INFO | test_vpc_firewall (DataLoader): created 5 built-in users
|
| 203 | 2026-01-14T21:22:33.944Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 204 | 2026-01-14T21:22:33.944Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 205 | 2026-01-14T21:22:33.949Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 206 | 2026-01-14T21:22:33.950Z | DEBG | test_vpc_firewall (DataLoader): attempting to create built-in role assignments
|
| 207 | 2026-01-14T21:22:33.950Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 208 | 2026-01-14T21:22:33.950Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 209 | 2026-01-14T21:22:33.953Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 210 | 2026-01-14T21:22:34.345Z | INFO | test_vpc_firewall (DataLoader): created 4 built-in role assignments
|
| 211 | 2026-01-14T21:22:34.345Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 212 | 2026-01-14T21:22:34.345Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 213 | 2026-01-14T21:22:34.348Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 214 | 2026-01-14T21:22:34.348Z | DEBG | test_vpc_firewall (DataLoader): attempting to create built-in silos
|
| 215 | 2026-01-14T21:22:34.348Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 216 | 2026-01-14T21:22:34.348Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 217 | 2026-01-14T21:22:34.349Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 218 | 2026-01-14T21:22:34.500Z | INFO | test_vpc_firewall (DataLoader): created 2 built-in silos
|
| 219 | 2026-01-14T21:22:34.500Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 220 | 2026-01-14T21:22:34.500Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 221 | 2026-01-14T21:22:34.501Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 222 | 2026-01-14T21:22:34.520Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 223 | 2026-01-14T21:22:34.520Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 224 | 2026-01-14T21:22:34.523Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 225 | 2026-01-14T21:22:34.523Z | DEBG | test_vpc_firewall (DataLoader): attempting to create built-in projects
|
| 226 | 2026-01-14T21:22:34.523Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 227 | 2026-01-14T21:22:34.523Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 228 | 2026-01-14T21:22:34.524Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 229 | 2026-01-14T21:22:34.537Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
| 230 | 2026-01-14T21:22:34.537Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 231 | 2026-01-14T21:22:34.537Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 232 | 2026-01-14T21:22:34.537Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 233 | 2026-01-14T21:22:34.539Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 234 | 2026-01-14T21:22:34.753Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 235 | 2026-01-14T21:22:34.753Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 236 | 2026-01-14T21:22:34.753Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 237 | 2026-01-14T21:22:34.754Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 238 | 2026-01-14T21:22:34.814Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 239 | 2026-01-14T21:22:34.849Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
| 240 | 2026-01-14T21:22:34.856Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
|
| 241 | 2026-01-14T21:22:34.858Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 242 | 2026-01-14T21:22:34.858Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 243 | 2026-01-14T21:22:34.858Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 244 | 2026-01-14T21:22:34.860Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 245 | 2026-01-14T21:22:34.868Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 246 | 2026-01-14T21:22:34.868Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 247 | 2026-01-14T21:22:34.868Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 248 | 2026-01-14T21:22:34.869Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 249 | 2026-01-14T21:22:34.903Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 250 | 2026-01-14T21:22:34.907Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
result = Ok(())
|
| 251 | 2026-01-14T21:22:34.907Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 252 | 2026-01-14T21:22:34.907Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 253 | 2026-01-14T21:22:34.907Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 254 | 2026-01-14T21:22:34.934Z | INFO | test_vpc_firewall (DataLoader): created built-in services project
|
| 255 | 2026-01-14T21:22:34.934Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 256 | 2026-01-14T21:22:34.934Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 257 | 2026-01-14T21:22:34.937Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 258 | 2026-01-14T21:22:34.937Z | DEBG | test_vpc_firewall (DataLoader): attempting to create built-in VPCs
|
| 259 | 2026-01-14T21:22:34.937Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 260 | 2026-01-14T21:22:34.937Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 261 | 2026-01-14T21:22:34.938Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 262 | 2026-01-14T21:22:34.945Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 263 | 2026-01-14T21:22:34.945Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 264 | 2026-01-14T21:22:34.946Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 265 | 2026-01-14T21:22:34.951Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
| 266 | 2026-01-14T21:22:34.952Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 267 | 2026-01-14T21:22:34.952Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 268 | 2026-01-14T21:22:34.952Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 269 | 2026-01-14T21:22:34.952Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 270 | 2026-01-14T21:22:34.981Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 271 | 2026-01-14T21:22:34.981Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 272 | 2026-01-14T21:22:34.981Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 273 | 2026-01-14T21:22:34.982Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 274 | 2026-01-14T21:22:34.987Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 275 | 2026-01-14T21:22:34.987Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 276 | 2026-01-14T21:22:34.987Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 277 | 2026-01-14T21:22:34.988Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 278 | 2026-01-14T21:22:34.998Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 279 | 2026-01-14T21:22:35.010Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
| 280 | 2026-01-14T21:22:35.010Z | TRAC | test_vpc_firewall (DataLoader): successful lookup of siloed resource "Project" using built-in user
|
| 281 | 2026-01-14T21:22:35.010Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
|
| 282 | 2026-01-14T21:22:35.010Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 283 | 2026-01-14T21:22:35.010Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 284 | 2026-01-14T21:22:35.010Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 285 | 2026-01-14T21:22:35.011Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 286 | 2026-01-14T21:22:35.026Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 287 | 2026-01-14T21:22:35.026Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 288 | 2026-01-14T21:22:35.027Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 289 | 2026-01-14T21:22:35.028Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 290 | 2026-01-14T21:22:35.043Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 291 | 2026-01-14T21:22:35.043Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 292 | 2026-01-14T21:22:35.043Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 293 | 2026-01-14T21:22:35.044Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 294 | 2026-01-14T21:22:35.049Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 295 | 2026-01-14T21:22:35.057Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
result = Ok(())
|
| 296 | 2026-01-14T21:22:35.057Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 297 | 2026-01-14T21:22:35.057Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 298 | 2026-01-14T21:22:35.057Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 299 | 2026-01-14T21:22:35.077Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
| 300 | 2026-01-14T21:22:35.077Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 301 | 2026-01-14T21:22:35.077Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 302 | 2026-01-14T21:22:35.077Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 303 | 2026-01-14T21:22:35.088Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 304 | 2026-01-14T21:22:35.107Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 305 | 2026-01-14T21:22:35.107Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 306 | 2026-01-14T21:22:35.107Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 307 | 2026-01-14T21:22:35.114Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 308 | 2026-01-14T21:22:35.131Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 309 | 2026-01-14T21:22:35.131Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 310 | 2026-01-14T21:22:35.131Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 311 | 2026-01-14T21:22:35.134Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 312 | 2026-01-14T21:22:35.159Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 313 | 2026-01-14T21:22:35.176Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
| 314 | 2026-01-14T21:22:35.182Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 315 | 2026-01-14T21:22:35.182Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 316 | 2026-01-14T21:22:35.182Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 317 | 2026-01-14T21:22:35.216Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 318 | 2026-01-14T21:22:35.216Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 319 | 2026-01-14T21:22:35.217Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 320 | 2026-01-14T21:22:35.245Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 321 | 2026-01-14T21:22:35.245Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 322 | 2026-01-14T21:22:35.248Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 323 | 2026-01-14T21:22:35.257Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
|
| 324 | 2026-01-14T21:22:35.257Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 325 | 2026-01-14T21:22:35.257Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 326 | 2026-01-14T21:22:35.257Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 327 | 2026-01-14T21:22:35.258Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 328 | 2026-01-14T21:22:35.263Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 329 | 2026-01-14T21:22:35.264Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 330 | 2026-01-14T21:22:35.264Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 331 | 2026-01-14T21:22:35.264Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 332 | 2026-01-14T21:22:35.284Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 333 | 2026-01-14T21:22:35.284Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 334 | 2026-01-14T21:22:35.284Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 335 | 2026-01-14T21:22:35.285Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 336 | 2026-01-14T21:22:35.297Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 337 | 2026-01-14T21:22:35.311Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
result = Ok(())
|
| 338 | 2026-01-14T21:22:35.311Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 339 | 2026-01-14T21:22:35.311Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 340 | 2026-01-14T21:22:35.312Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 341 | 2026-01-14T21:22:35.377Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 342 | 2026-01-14T21:22:35.377Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 343 | 2026-01-14T21:22:35.377Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 344 | 2026-01-14T21:22:35.377Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 345 | 2026-01-14T21:22:35.378Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 346 | 2026-01-14T21:22:35.437Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 347 | 2026-01-14T21:22:35.438Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 348 | 2026-01-14T21:22:35.438Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 349 | 2026-01-14T21:22:35.439Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 350 | 2026-01-14T21:22:35.452Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 351 | 2026-01-14T21:22:35.452Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 352 | 2026-01-14T21:22:35.452Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 353 | 2026-01-14T21:22:35.452Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 354 | 2026-01-14T21:22:35.464Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 355 | 2026-01-14T21:22:35.472Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 356 | 2026-01-14T21:22:35.472Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 357 | 2026-01-14T21:22:35.472Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 358 | 2026-01-14T21:22:35.472Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 359 | 2026-01-14T21:22:35.575Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 360 | 2026-01-14T21:22:35.575Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 361 | 2026-01-14T21:22:35.575Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 362 | 2026-01-14T21:22:35.575Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 363 | 2026-01-14T21:22:35.576Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 364 | 2026-01-14T21:22:35.597Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 365 | 2026-01-14T21:22:35.597Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 366 | 2026-01-14T21:22:35.597Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 367 | 2026-01-14T21:22:35.598Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 368 | 2026-01-14T21:22:35.613Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 369 | 2026-01-14T21:22:35.613Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 370 | 2026-01-14T21:22:35.614Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 371 | 2026-01-14T21:22:35.615Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 372 | 2026-01-14T21:22:35.633Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 373 | 2026-01-14T21:22:35.657Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 374 | 2026-01-14T21:22:35.658Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 375 | 2026-01-14T21:22:35.658Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 376 | 2026-01-14T21:22:35.658Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 377 | 2026-01-14T21:22:35.670Z | DEBG | test_vpc_firewall (DataLoader): attempting to create built-in VPC firewall rules
|
| 378 | 2026-01-14T21:22:35.671Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 379 | 2026-01-14T21:22:35.671Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 380 | 2026-01-14T21:22:35.671Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 381 | 2026-01-14T21:22:35.680Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 382 | 2026-01-14T21:22:35.680Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 383 | 2026-01-14T21:22:35.682Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 384 | 2026-01-14T21:22:35.690Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 385 | 2026-01-14T21:22:35.690Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 386 | 2026-01-14T21:22:35.692Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 387 | 2026-01-14T21:22:35.709Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 388 | 2026-01-14T21:22:35.710Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 389 | 2026-01-14T21:22:35.710Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 390 | 2026-01-14T21:22:35.710Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 391 | 2026-01-14T21:22:35.711Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 392 | 2026-01-14T21:22:35.720Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 393 | 2026-01-14T21:22:35.721Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 394 | 2026-01-14T21:22:35.721Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 395 | 2026-01-14T21:22:35.722Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 396 | 2026-01-14T21:22:35.729Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 397 | 2026-01-14T21:22:35.734Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 398 | 2026-01-14T21:22:35.734Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 399 | 2026-01-14T21:22:35.736Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 400 | 2026-01-14T21:22:35.757Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 401 | 2026-01-14T21:22:35.774Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 402 | 2026-01-14T21:22:35.774Z | TRAC | test_vpc_firewall (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
| 403 | 2026-01-14T21:22:35.774Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 404 | 2026-01-14T21:22:35.774Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 405 | 2026-01-14T21:22:35.774Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 406 | 2026-01-14T21:22:35.774Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 407 | 2026-01-14T21:22:35.775Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 408 | 2026-01-14T21:22:35.821Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 409 | 2026-01-14T21:22:35.821Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 410 | 2026-01-14T21:22:35.821Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 411 | 2026-01-14T21:22:35.822Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 412 | 2026-01-14T21:22:35.849Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 413 | 2026-01-14T21:22:35.849Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 414 | 2026-01-14T21:22:35.849Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 415 | 2026-01-14T21:22:35.850Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 416 | 2026-01-14T21:22:35.869Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 417 | 2026-01-14T21:22:35.904Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 418 | 2026-01-14T21:22:35.910Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 419 | 2026-01-14T21:22:35.910Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 420 | 2026-01-14T21:22:35.911Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 421 | 2026-01-14T21:22:35.967Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 422 | 2026-01-14T21:22:35.968Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 423 | 2026-01-14T21:22:35.968Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 424 | 2026-01-14T21:22:35.968Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 425 | 2026-01-14T21:22:35.968Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 426 | 2026-01-14T21:22:35.972Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 427 | 2026-01-14T21:22:35.972Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 428 | 2026-01-14T21:22:35.972Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 429 | 2026-01-14T21:22:35.973Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 430 | 2026-01-14T21:22:35.977Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 431 | 2026-01-14T21:22:35.977Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 432 | 2026-01-14T21:22:35.977Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 433 | 2026-01-14T21:22:35.977Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 434 | 2026-01-14T21:22:35.990Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 435 | 2026-01-14T21:22:36.037Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 436 | 2026-01-14T21:22:36.037Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 437 | 2026-01-14T21:22:36.037Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 438 | 2026-01-14T21:22:36.038Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 439 | 2026-01-14T21:22:36.180Z | INFO | test_vpc_firewall (DataLoader): created built-in VPC firewall rules
|
| 440 | 2026-01-14T21:22:36.180Z | DEBG | test_vpc_firewall (DataLoader): attempting to create built-in VPC Subnets
|
| 441 | 2026-01-14T21:22:36.180Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 442 | 2026-01-14T21:22:36.181Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 443 | 2026-01-14T21:22:36.182Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 444 | 2026-01-14T21:22:36.188Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 445 | 2026-01-14T21:22:36.188Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 446 | 2026-01-14T21:22:36.189Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 447 | 2026-01-14T21:22:36.199Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 448 | 2026-01-14T21:22:36.199Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 449 | 2026-01-14T21:22:36.201Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 450 | 2026-01-14T21:22:36.210Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 451 | 2026-01-14T21:22:36.210Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 452 | 2026-01-14T21:22:36.210Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 453 | 2026-01-14T21:22:36.210Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 454 | 2026-01-14T21:22:36.211Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 455 | 2026-01-14T21:22:36.219Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 456 | 2026-01-14T21:22:36.219Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 457 | 2026-01-14T21:22:36.219Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 458 | 2026-01-14T21:22:36.220Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 459 | 2026-01-14T21:22:36.223Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 460 | 2026-01-14T21:22:36.224Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 461 | 2026-01-14T21:22:36.224Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 462 | 2026-01-14T21:22:36.224Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 463 | 2026-01-14T21:22:36.228Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 464 | 2026-01-14T21:22:36.235Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 465 | 2026-01-14T21:22:36.235Z | TRAC | test_vpc_firewall (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
|
| 466 | 2026-01-14T21:22:36.235Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 467 | 2026-01-14T21:22:36.236Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 468 | 2026-01-14T21:22:36.236Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 469 | 2026-01-14T21:22:36.247Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 470 | 2026-01-14T21:22:36.248Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 471 | 2026-01-14T21:22:36.248Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 472 | 2026-01-14T21:22:36.249Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 473 | 2026-01-14T21:22:36.250Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 474 | 2026-01-14T21:22:36.267Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 475 | 2026-01-14T21:22:36.267Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 476 | 2026-01-14T21:22:36.267Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 477 | 2026-01-14T21:22:36.268Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 478 | 2026-01-14T21:22:36.279Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 479 | 2026-01-14T21:22:36.279Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 480 | 2026-01-14T21:22:36.279Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 481 | 2026-01-14T21:22:36.280Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 482 | 2026-01-14T21:22:36.299Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 483 | 2026-01-14T21:22:36.309Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 484 | 2026-01-14T21:22:36.324Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 485 | 2026-01-14T21:22:36.324Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 486 | 2026-01-14T21:22:36.325Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 487 | 2026-01-14T21:22:36.325Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 488 | 2026-01-14T21:22:36.325Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 489 | 2026-01-14T21:22:36.330Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 490 | 2026-01-14T21:22:36.330Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 491 | 2026-01-14T21:22:36.331Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 492 | 2026-01-14T21:22:36.332Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 493 | 2026-01-14T21:22:36.342Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 494 | 2026-01-14T21:22:36.342Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 495 | 2026-01-14T21:22:36.342Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 496 | 2026-01-14T21:22:36.344Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 497 | 2026-01-14T21:22:36.373Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 498 | 2026-01-14T21:22:36.384Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 499 | 2026-01-14T21:22:36.384Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 500 | 2026-01-14T21:22:36.384Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 501 | 2026-01-14T21:22:36.384Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 502 | 2026-01-14T21:22:36.418Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 503 | 2026-01-14T21:22:36.419Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 504 | 2026-01-14T21:22:36.420Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 505 | 2026-01-14T21:22:36.456Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 506 | 2026-01-14T21:22:36.456Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 507 | 2026-01-14T21:22:36.456Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 508 | 2026-01-14T21:22:36.456Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 509 | 2026-01-14T21:22:36.457Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 510 | 2026-01-14T21:22:36.533Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 511 | 2026-01-14T21:22:36.533Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 512 | 2026-01-14T21:22:36.533Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 513 | 2026-01-14T21:22:36.534Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 514 | 2026-01-14T21:22:36.544Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 515 | 2026-01-14T21:22:36.545Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 516 | 2026-01-14T21:22:36.545Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 517 | 2026-01-14T21:22:36.546Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 518 | 2026-01-14T21:22:36.553Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 519 | 2026-01-14T21:22:36.568Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 520 | 2026-01-14T21:22:36.589Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 521 | 2026-01-14T21:22:36.589Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 522 | 2026-01-14T21:22:36.589Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 523 | 2026-01-14T21:22:36.589Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 524 | 2026-01-14T21:22:36.590Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 525 | 2026-01-14T21:22:36.642Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 526 | 2026-01-14T21:22:36.642Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 527 | 2026-01-14T21:22:36.643Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 528 | 2026-01-14T21:22:36.644Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 529 | 2026-01-14T21:22:36.678Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 530 | 2026-01-14T21:22:36.679Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 531 | 2026-01-14T21:22:36.679Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 532 | 2026-01-14T21:22:36.680Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 533 | 2026-01-14T21:22:36.688Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 534 | 2026-01-14T21:22:36.714Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 535 | 2026-01-14T21:22:36.714Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 536 | 2026-01-14T21:22:36.714Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 537 | 2026-01-14T21:22:36.714Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 538 | 2026-01-14T21:22:36.730Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 539 | 2026-01-14T21:22:36.757Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 540 | 2026-01-14T21:22:36.757Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 541 | 2026-01-14T21:22:36.775Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 542 | 2026-01-14T21:22:36.776Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 543 | 2026-01-14T21:22:36.776Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 544 | 2026-01-14T21:22:36.776Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 545 | 2026-01-14T21:22:36.777Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 546 | 2026-01-14T21:22:36.783Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 547 | 2026-01-14T21:22:36.783Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 548 | 2026-01-14T21:22:36.783Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 549 | 2026-01-14T21:22:36.784Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 550 | 2026-01-14T21:22:36.860Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 551 | 2026-01-14T21:22:36.860Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 552 | 2026-01-14T21:22:36.860Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 553 | 2026-01-14T21:22:36.861Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 554 | 2026-01-14T21:22:36.880Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 555 | 2026-01-14T21:22:36.901Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 556 | 2026-01-14T21:22:36.926Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
|
| 557 | 2026-01-14T21:22:36.926Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 558 | 2026-01-14T21:22:36.926Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 559 | 2026-01-14T21:22:36.926Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 560 | 2026-01-14T21:22:36.927Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 561 | 2026-01-14T21:22:36.937Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 562 | 2026-01-14T21:22:36.937Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 563 | 2026-01-14T21:22:36.937Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 564 | 2026-01-14T21:22:36.938Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 565 | 2026-01-14T21:22:36.942Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 566 | 2026-01-14T21:22:36.942Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 567 | 2026-01-14T21:22:36.942Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 568 | 2026-01-14T21:22:36.943Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 569 | 2026-01-14T21:22:36.948Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 570 | 2026-01-14T21:22:36.960Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
result = Ok(())
|
| 571 | 2026-01-14T21:22:36.963Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 572 | 2026-01-14T21:22:36.964Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 573 | 2026-01-14T21:22:36.965Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 574 | 2026-01-14T21:22:37.034Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 575 | 2026-01-14T21:22:37.034Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 576 | 2026-01-14T21:22:37.034Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 577 | 2026-01-14T21:22:37.040Z | INFO | test_vpc_firewall (DataLoader): created built-in services vpc subnets
|
| 578 | 2026-01-14T21:22:37.041Z | INFO | test_vpc_firewall (DataLoader): created built-in services vpc
|
| 579 | 2026-01-14T21:22:37.041Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 580 | 2026-01-14T21:22:37.041Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 581 | 2026-01-14T21:22:37.043Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 582 | 2026-01-14T21:22:37.043Z | DEBG | test_vpc_firewall (DataLoader): attempting to create silo users
|
| 583 | 2026-01-14T21:22:37.043Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 584 | 2026-01-14T21:22:37.044Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 585 | 2026-01-14T21:22:37.044Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 586 | 2026-01-14T21:22:37.130Z | INFO | test_vpc_firewall (DataLoader): created 2 silo users
|
| 587 | 2026-01-14T21:22:37.130Z | DEBG | test_vpc_firewall (DataLoader): attempting to create silo user role assignments
|
| 588 | 2026-01-14T21:22:37.130Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 589 | 2026-01-14T21:22:37.130Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 590 | 2026-01-14T21:22:37.131Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 591 | 2026-01-14T21:22:37.147Z | INFO | test_vpc_firewall (DataLoader): created 2 silo user role assignments
|
| 592 | 2026-01-14T21:22:37.147Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 593 | 2026-01-14T21:22:37.147Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 594 | 2026-01-14T21:22:37.148Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 595 | 2026-01-14T21:22:37.172Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 596 | 2026-01-14T21:22:37.172Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 597 | 2026-01-14T21:22:37.174Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 598 | 2026-01-14T21:22:37.193Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
|
| 599 | 2026-01-14T21:22:37.194Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 600 | 2026-01-14T21:22:37.194Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 601 | 2026-01-14T21:22:37.194Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 602 | 2026-01-14T21:22:37.195Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 603 | 2026-01-14T21:22:37.220Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 604 | 2026-01-14T21:22:37.223Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
result = Ok(())
|
| 605 | 2026-01-14T21:22:37.223Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 606 | 2026-01-14T21:22:37.223Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 607 | 2026-01-14T21:22:37.223Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 608 | 2026-01-14T21:22:37.447Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
|
| 609 | 2026-01-14T21:22:37.447Z | TRAC | test_vpc_firewall (DataLoader): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 610 | 2026-01-14T21:22:37.447Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 611 | 2026-01-14T21:22:37.447Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 612 | 2026-01-14T21:22:37.449Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 613 | 2026-01-14T21:22:37.468Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 614 | 2026-01-14T21:22:37.471Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = IpPoolList
result = Ok(())
|
| 615 | 2026-01-14T21:22:37.471Z | TRAC | test_vpc_firewall (DataLoader): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
|
| 616 | 2026-01-14T21:22:37.471Z | DEBG | test_vpc_firewall (DataLoader): roles
roles = RoleSet { roles: {} }
|
| 617 | 2026-01-14T21:22:37.471Z | DEBG | test_vpc_firewall (DataLoader): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 618 | 2026-01-14T21:22:37.508Z | INFO | test_vpc_firewall (nexus): populate complete
|
| 619 | 2026-01-14T21:22:37.508Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 620 | 2026-01-14T21:22:37.508Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 621 | 2026-01-14T21:22:37.508Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 622 | 2026-01-14T21:22:37.508Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
roles = RoleSet { roles: {} }
|
| 623 | 2026-01-14T21:22:37.509Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 624 | 2026-01-14T21:22:37.516Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_gateway_switch0
|
| 625 | 2026-01-14T21:22:37.516Z | DEBG | test_vpc_firewall: Starting Management Gateway
|
| 626 | 2026-01-14T21:22:37.569Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 627 | 2026-01-14T21:22:37.582Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 628 | 2026-01-14T21:22:37.583Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 629 | 2026-01-14T21:22:37.583Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
roles = RoleSet { roles: {} }
|
| 630 | 2026-01-14T21:22:37.584Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 631 | 2026-01-14T21:22:37.607Z | INFO | test_vpc_firewall (nexus): activating background tasks
|
| 632 | 2026-01-14T21:22:37.614Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 1
reason = Timeout
|
| 633 | 2026-01-14T21:22:37.614Z | WARN | test_vpc_firewall (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config nor servers
|
| 634 | 2026-01-14T21:22:37.614Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 334.388\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
| 635 | 2026-01-14T21:22:37.614Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_executor
iteration = 1
reason = Timeout
|
| 636 | 2026-01-14T21:22:37.614Z | WARN | test_vpc_firewall (BackgroundTasks): Blueprint execution: skipped
background_task = blueprint_executor
reason = no blueprint
|
| 637 | 2026-01-14T21:22:37.614Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_executor
elapsed = 79.055\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 638 | 2026-01-14T21:22:37.614Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = inventory_collection
iteration = 1
reason = Timeout
|
| 639 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 640 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 641 | 2026-01-14T21:22:37.614Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 642 | 2026-01-14T21:22:37.614Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 643 | 2026-01-14T21:22:37.616Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 644 | 2026-01-14T21:22:37.619Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = inventory_loader
iteration = 1
reason = Timeout
|
| 645 | 2026-01-14T21:22:37.619Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
|
| 646 | 2026-01-14T21:22:37.619Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 647 | 2026-01-14T21:22:37.619Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 648 | 2026-01-14T21:22:37.619Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 649 | 2026-01-14T21:22:37.620Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 650 | 2026-01-14T21:22:37.621Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 1
reason = Timeout
|
| 651 | 2026-01-14T21:22:37.621Z | DEBG | test_vpc_firewall (BackgroundTasks): reconfigurator config not yet loaded; doing nothing
background_task = blueprint_planner
|
| 652 | 2026-01-14T21:22:37.621Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 125.166\u{b5}s
iteration = 1
status = "Disabled"
|
| 653 | 2026-01-14T21:22:37.621Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_loader
iteration = 1
reason = Timeout
|
| 654 | 2026-01-14T21:22:37.621Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
|
| 655 | 2026-01-14T21:22:37.621Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 656 | 2026-01-14T21:22:37.621Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 657 | 2026-01-14T21:22:37.621Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 658 | 2026-01-14T21:22:37.622Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 659 | 2026-01-14T21:22:37.630Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = crdb_node_id_collector
iteration = 1
reason = Timeout
|
| 660 | 2026-01-14T21:22:37.630Z | WARN | test_vpc_firewall (BackgroundTasks): Blueprint execution: skipped
background_task = crdb_node_id_collector
reason = no blueprint
|
| 661 | 2026-01-14T21:22:37.630Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = crdb_node_id_collector
elapsed = 149.444\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 662 | 2026-01-14T21:22:37.630Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = support_bundle_collector
iteration = 1
reason = Timeout
|
| 663 | 2026-01-14T21:22:37.631Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
|
| 664 | 2026-01-14T21:22:37.631Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = support_bundle_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 665 | 2026-01-14T21:22:37.631Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 666 | 2026-01-14T21:22:37.631Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 667 | 2026-01-14T21:22:37.632Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 668 | 2026-01-14T21:22:37.634Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 1
reason = Timeout
|
| 669 | 2026-01-14T21:22:37.635Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 1.246413ms
iteration = 1
status = {"error":"task disabled"}
|
| 670 | 2026-01-14T21:22:37.635Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 1
reason = Timeout
|
| 671 | 2026-01-14T21:22:37.636Z | WARN | test_vpc_firewall (BackgroundTasks): Blueprint rendezvous: skipped
background_task = blueprint_rendezvous
reason = no blueprint
|
| 672 | 2026-01-14T21:22:37.636Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 281.433\u{b5}s
iteration = 1
status = {"error":"no blueprint"}
|
| 673 | 2026-01-14T21:22:37.636Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 1
reason = Timeout
|
| 674 | 2026-01-14T21:22:37.636Z | INFO | test_vpc_firewall (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
| 675 | 2026-01-14T21:22:37.636Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 676 | 2026-01-14T21:22:37.636Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 677 | 2026-01-14T21:22:37.636Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 678 | 2026-01-14T21:22:37.636Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 679 | 2026-01-14T21:22:37.638Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 680 | 2026-01-14T21:22:37.639Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = tuf_repo_pruner
iteration = 1
reason = Timeout
|
| 681 | 2026-01-14T21:22:37.639Z | INFO | test_vpc_firewall (BackgroundTasks): reconfigurator config not yet loaded; doing nothing
background_task = tuf_repo_pruner
|
| 682 | 2026-01-14T21:22:37.639Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = tuf_repo_pruner
elapsed = 308.137\u{b5}s
iteration = 1
status = {"reason":"reconfigurator config not yet loaded","status":"disabled"}
|
| 683 | 2026-01-14T21:22:37.639Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 1
reason = Timeout
|
| 684 | 2026-01-14T21:22:37.639Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 685 | 2026-01-14T21:22:37.640Z | TRAC | test_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 686 | 2026-01-14T21:22:37.640Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 687 | 2026-01-14T21:22:37.640Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = fm_sitrep_gc
iteration = 1
reason = Timeout
|
| 688 | 2026-01-14T21:22:37.640Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 689 | 2026-01-14T21:22:37.641Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 690 | 2026-01-14T21:22:37.641Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 691 | 2026-01-14T21:22:37.643Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 692 | 2026-01-14T21:22:37.643Z | DEBG | test_vpc_firewall (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
| 693 | 2026-01-14T21:22:37.643Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 694 | 2026-01-14T21:22:37.643Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 695 | 2026-01-14T21:22:37.644Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 696 | 2026-01-14T21:22:37.647Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 697 | 2026-01-14T21:22:37.647Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
| 698 | 2026-01-14T21:22:37.648Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 1
reason = Timeout
|
| 699 | 2026-01-14T21:22:37.648Z | WARN | test_vpc_firewall (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config nor servers
|
| 700 | 2026-01-14T21:22:37.648Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 260.131\u{b5}s
iteration = 1
status = {"error":"no config nor servers"}
|
| 701 | 2026-01-14T21:22:37.648Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 1
reason = Timeout
|
| 702 | 2026-01-14T21:22:37.648Z | DEBG | test_vpc_firewall (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
| 703 | 2026-01-14T21:22:37.648Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 704 | 2026-01-14T21:22:37.648Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 705 | 2026-01-14T21:22:37.650Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 706 | 2026-01-14T21:22:37.650Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 1
reason = Timeout
|
| 707 | 2026-01-14T21:22:37.651Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
| 708 | 2026-01-14T21:22:37.651Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = metrics_producer_gc
iteration = 1
reason = Timeout
|
| 709 | 2026-01-14T21:22:37.651Z | INFO | test_vpc_firewall (BackgroundTasks): Metric producer GC running
background_task = metrics_producer_gc
expiration = 2026-01-14 21:12:37.651535994 UTC
|
| 710 | 2026-01-14T21:22:37.651Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = metrics_producer_gc
resource = Database
|
| 711 | 2026-01-14T21:22:37.652Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = metrics_producer_gc
roles = RoleSet { roles: {} }
|
| 712 | 2026-01-14T21:22:37.652Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = metrics_producer_gc
resource = Database
result = Ok(())
|
| 713 | 2026-01-14T21:22:37.667Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = external_endpoints
iteration = 1
reason = Timeout
|
| 714 | 2026-01-14T21:22:37.667Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 715 | 2026-01-14T21:22:37.667Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 716 | 2026-01-14T21:22:37.667Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 717 | 2026-01-14T21:22:37.668Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 718 | 2026-01-14T21:22:37.668Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 719 | 2026-01-14T21:22:37.670Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = nat_garbage_collector
iteration = 1
reason = Timeout
|
| 720 | 2026-01-14T21:22:37.673Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = nat_garbage_collector
resource = Database
|
| 721 | 2026-01-14T21:22:37.674Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = nat_garbage_collector
roles = RoleSet { roles: {} }
|
| 722 | 2026-01-14T21:22:37.675Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = nat_garbage_collector
resource = Database
result = Ok(())
|
| 723 | 2026-01-14T21:22:37.676Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = bfd_manager
iteration = 1
reason = Timeout
|
| 724 | 2026-01-14T21:22:37.676Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = bfd_manager
resource = Database
|
| 725 | 2026-01-14T21:22:37.676Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = bfd_manager
roles = RoleSet { roles: {} }
|
| 726 | 2026-01-14T21:22:37.677Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = bfd_manager
resource = Database
result = Ok(())
|
| 727 | 2026-01-14T21:22:37.678Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = phantom_disks
iteration = 1
reason = Timeout
|
| 728 | 2026-01-14T21:22:37.679Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 1
reason = Timeout
|
| 729 | 2026-01-14T21:22:37.679Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 730 | 2026-01-14T21:22:37.679Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 731 | 2026-01-14T21:22:37.679Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 732 | 2026-01-14T21:22:37.679Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 733 | 2026-01-14T21:22:37.680Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 734 | 2026-01-14T21:22:37.681Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = decommissioned_disk_cleaner
iteration = 1
reason = Timeout
|
| 735 | 2026-01-14T21:22:37.681Z | INFO | test_vpc_firewall (BackgroundTasks): Decommissioned Disk Cleaner disabled
background_task = decommissioned_disk_cleaner
|
| 736 | 2026-01-14T21:22:37.681Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = decommissioned_disk_cleaner
elapsed = 203.381\u{b5}s
iteration = 1
status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
|
| 737 | 2026-01-14T21:22:37.681Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = service_zone_nat_tracker
iteration = 1
reason = Timeout
|
| 738 | 2026-01-14T21:22:37.681Z | WARN | test_vpc_firewall (BackgroundTasks): inventory collection is None
background_task = service_zone_nat_tracker
|
| 739 | 2026-01-14T21:22:37.681Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = service_zone_nat_tracker
elapsed = 66.961\u{b5}s
iteration = 1
status = {"error":"inventory collection is None"}
|
| 740 | 2026-01-14T21:22:37.681Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = switch_port_config_manager
iteration = 1
reason = Timeout
|
| 741 | 2026-01-14T21:22:37.682Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Fleet
|
| 742 | 2026-01-14T21:22:37.682Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = switch_port_config_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 743 | 2026-01-14T21:22:37.682Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
|
| 744 | 2026-01-14T21:22:37.682Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
| 745 | 2026-01-14T21:22:37.683Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
| 746 | 2026-01-14T21:22:37.684Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = v2p_manager
iteration = 1
reason = Timeout
|
| 747 | 2026-01-14T21:22:37.685Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 748 | 2026-01-14T21:22:37.685Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 749 | 2026-01-14T21:22:37.685Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 750 | 2026-01-14T21:22:37.686Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = region_replacement
iteration = 1
reason = Timeout
|
| 751 | 2026-01-14T21:22:37.686Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
|
| 752 | 2026-01-14T21:22:37.686Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
| 753 | 2026-01-14T21:22:37.687Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
| 754 | 2026-01-14T21:22:37.688Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = region_replacement_driver
iteration = 1
reason = Timeout
|
| 755 | 2026-01-14T21:22:37.688Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
|
| 756 | 2026-01-14T21:22:37.688Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
| 757 | 2026-01-14T21:22:37.688Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
| 758 | 2026-01-14T21:22:37.689Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = instance_watcher
iteration = 1
reason = Timeout
|
| 759 | 2026-01-14T21:22:37.689Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Fleet
|
| 760 | 2026-01-14T21:22:37.689Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = instance_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 761 | 2026-01-14T21:22:37.689Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
|
| 762 | 2026-01-14T21:22:37.690Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
| 763 | 2026-01-14T21:22:37.690Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
| 764 | 2026-01-14T21:22:37.691Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = instance_updater
iteration = 1
reason = Timeout
|
| 765 | 2026-01-14T21:22:37.691Z | INFO | test_vpc_firewall (BackgroundTasks): background instance updater explicitly disabled
background_task = instance_updater
|
| 766 | 2026-01-14T21:22:37.691Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = instance_updater
elapsed = 371.07\u{b5}s
iteration = 1
status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
|
| 767 | 2026-01-14T21:22:37.691Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = instance_reincarnation
iteration = 1
reason = Timeout
|
| 768 | 2026-01-14T21:22:37.692Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
|
| 769 | 2026-01-14T21:22:37.692Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
| 770 | 2026-01-14T21:22:37.692Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
| 771 | 2026-01-14T21:22:37.693Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = service_firewall_rule_propagation
iteration = 1
reason = Timeout
|
| 772 | 2026-01-14T21:22:37.693Z | DEBG | test_vpc_firewall (service-firewall-rule-progator): starting background task for service firewall rule propagation
background_task = service_firewall_rule_propagation
|
| 773 | 2026-01-14T21:22:37.693Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 774 | 2026-01-14T21:22:37.693Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 775 | 2026-01-14T21:22:37.694Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 776 | 2026-01-14T21:22:37.694Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = abandoned_vmm_reaper
iteration = 1
reason = Timeout
|
| 777 | 2026-01-14T21:22:37.695Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = abandoned_vmm_reaper
resource = Database
|
| 778 | 2026-01-14T21:22:37.695Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = abandoned_vmm_reaper
roles = RoleSet { roles: {} }
|
| 779 | 2026-01-14T21:22:37.696Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = abandoned_vmm_reaper
resource = Database
result = Ok(())
|
| 780 | 2026-01-14T21:22:37.696Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = saga_recovery
iteration = 1
reason = Timeout
|
| 781 | 2026-01-14T21:22:37.696Z | INFO | test_vpc_firewall (SagaQuiesceHandle): saga recovery pass starting
|
| 782 | 2026-01-14T21:22:37.696Z | DEBG | test_vpc_firewall (SagaRecoverer): listing candidate sagas for recovery
|
| 783 | 2026-01-14T21:22:37.697Z | TRAC | test_vpc_firewall (SagaRecoverer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. })
resource = Database
|
| 784 | 2026-01-14T21:22:37.697Z | DEBG | test_vpc_firewall (SagaRecoverer): roles
roles = RoleSet { roles: {} }
|
| 785 | 2026-01-14T21:22:37.697Z | DEBG | test_vpc_firewall (SagaRecoverer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. })
resource = Database
result = Ok(())
|
| 786 | 2026-01-14T21:22:37.826Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = lookup_region_port
iteration = 1
reason = Timeout
|
| 787 | 2026-01-14T21:22:37.826Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = lookup_region_port
resource = Database
|
| 788 | 2026-01-14T21:22:37.827Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = lookup_region_port
roles = RoleSet { roles: {} }
|
| 789 | 2026-01-14T21:22:37.858Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = lookup_region_port
resource = Database
result = Ok(())
|
| 790 | 2026-01-14T21:22:37.859Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = region_snapshot_replacement_start
iteration = 1
reason = Timeout
|
| 791 | 2026-01-14T21:22:37.859Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
|
| 792 | 2026-01-14T21:22:37.860Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_snapshot_replacement_start
roles = RoleSet { roles: {} }
|
| 793 | 2026-01-14T21:22:37.860Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
result = Ok(())
|
| 794 | 2026-01-14T21:22:37.861Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = region_snapshot_replacement_garbage_collection
iteration = 1
reason = Timeout
|
| 795 | 2026-01-14T21:22:37.861Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_garbage_collection
resource = Database
|
| 796 | 2026-01-14T21:22:37.861Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_snapshot_replacement_garbage_collection
roles = RoleSet { roles: {} }
|
| 797 | 2026-01-14T21:22:37.862Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_garbage_collection
resource = Database
result = Ok(())
|
| 798 | 2026-01-14T21:22:37.863Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = region_snapshot_replacement_step
iteration = 1
reason = Timeout
|
| 799 | 2026-01-14T21:22:37.863Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 800 | 2026-01-14T21:22:37.864Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 801 | 2026-01-14T21:22:37.864Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 802 | 2026-01-14T21:22:37.865Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = region_snapshot_replacement_finish
iteration = 1
reason = Timeout
|
| 803 | 2026-01-14T21:22:37.865Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_finish
resource = Database
|
| 804 | 2026-01-14T21:22:37.865Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_snapshot_replacement_finish
roles = RoleSet { roles: {} }
|
| 805 | 2026-01-14T21:22:37.866Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_finish
resource = Database
result = Ok(())
|
| 806 | 2026-01-14T21:22:37.867Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = tuf_artifact_replication
iteration = 1
reason = Timeout
|
| 807 | 2026-01-14T21:22:37.867Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 808 | 2026-01-14T21:22:37.867Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 809 | 2026-01-14T21:22:37.867Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 810 | 2026-01-14T21:22:37.867Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 811 | 2026-01-14T21:22:37.867Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 812 | 2026-01-14T21:22:37.868Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = read_only_region_replacement_start
iteration = 1
reason = Timeout
|
| 813 | 2026-01-14T21:22:37.869Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = read_only_region_replacement_start
resource = Database
|
| 814 | 2026-01-14T21:22:37.869Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = read_only_region_replacement_start
roles = RoleSet { roles: {} }
|
| 815 | 2026-01-14T21:22:37.869Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = read_only_region_replacement_start
resource = Database
result = Ok(())
|
| 816 | 2026-01-14T21:22:37.870Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = alert_dispatcher
iteration = 1
reason = Timeout
|
| 817 | 2026-01-14T21:22:37.870Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
|
| 818 | 2026-01-14T21:22:37.870Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = alert_dispatcher
roles = RoleSet { roles: {} }
|
| 819 | 2026-01-14T21:22:37.875Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
result = Ok(())
|
| 820 | 2026-01-14T21:22:37.876Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = webhook_deliverator
iteration = 1
reason = Timeout
|
| 821 | 2026-01-14T21:22:37.881Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = webhook_deliverator
resource = Database
|
| 822 | 2026-01-14T21:22:37.882Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = webhook_deliverator
roles = RoleSet { roles: {} }
|
| 823 | 2026-01-14T21:22:37.882Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = webhook_deliverator
resource = Database
result = Ok(())
|
| 824 | 2026-01-14T21:22:37.884Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = sp_ereport_ingester
iteration = 1
reason = Timeout
|
| 825 | 2026-01-14T21:22:37.884Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 826 | 2026-01-14T21:22:37.884Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = fm_sitrep_loader
iteration = 1
reason = Timeout
|
| 827 | 2026-01-14T21:22:37.884Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
|
| 828 | 2026-01-14T21:22:37.884Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 829 | 2026-01-14T21:22:37.884Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 830 | 2026-01-14T21:22:37.884Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 831 | 2026-01-14T21:22:37.900Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 832 | 2026-01-14T21:22:37.902Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = probe_distributor
iteration = 1
reason = Timeout
|
| 833 | 2026-01-14T21:22:37.902Z | INFO | test_vpc_firewall (BackgroundTasks): distributing networking probes to sleds
background_task = probe_distributor
|
| 834 | 2026-01-14T21:22:37.902Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
|
| 835 | 2026-01-14T21:22:37.902Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = probe_distributor
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 836 | 2026-01-14T21:22:37.902Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 837 | 2026-01-14T21:22:37.902Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 838 | 2026-01-14T21:22:37.903Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 839 | 2026-01-14T21:22:38.066Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_dendrite_switch0
|
| 840 | 2026-01-14T21:22:38.066Z | DEBG | test_vpc_firewall: Starting Dendrite for switch0
|
| 841 | 2026-01-14T21:22:38.093Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 842 | 2026-01-14T21:22:38.104Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 843 | 2026-01-14T21:22:38.105Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 844 | 2026-01-14T21:22:38.105Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 845 | 2026-01-14T21:22:38.106Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 846 | 2026-01-14T21:22:38.125Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 75 a7 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 u............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:38130
req_id = ae498753-954e-46a7-b08a-7735d51d2e4c
|
| 847 | 2026-01-14T21:22:38.125Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 30119,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:38130
req_id = ae498753-954e-46a7-b08a-7735d51d2e4c
|
| 848 | 2026-01-14T21:22:38.126Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 30119,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:38130
req_id = ae498753-954e-46a7-b08a-7735d51d2e4c
|
| 849 | 2026-01-14T21:22:38.127Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: 91 f4 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 ............._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:26537
req_id = ccd53fe7-53aa-4186-ae9b-96514345a5e3
|
| 850 | 2026-01-14T21:22:38.127Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 37364,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:26537
req_id = ccd53fe7-53aa-4186-ae9b-96514345a5e3
|
| 851 | 2026-01-14T21:22:38.128Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 37364,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_nameservice._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_nameservice._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
12,
95,
110,
97,
109,
101,
115,
101,
114,
118,
105,
99,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:26537
req_id = ccd53fe7-53aa-4186-ae9b-96514345a5e3
|
| 852 | 2026-01-14T21:22:38.128Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: 71 ab 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 q............_ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:34664
req_id = cca7fe12-0f17-49b8-ba04-3dd6500514b5
|
| 853 | 2026-01-14T21:22:38.128Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 29099,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:34664
req_id = cca7fe12-0f17-49b8-ba04-3dd6500514b5
|
| 854 | 2026-01-14T21:22:38.129Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 29099,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_external-dns._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_external-dns._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
13,
95,
101,
120,
116,
101,
114,
110,
97,
108,
45,
100,
110,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:34664
req_id = cca7fe12-0f17-49b8-ba04-3dd6500514b5
|
| 855 | 2026-01-14T21:22:38.129Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 09 54 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .T..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:6783
req_id = 34df2e1f-7306-405c-b166-101ca139b5e3
|
| 856 | 2026-01-14T21:22:38.129Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 2388,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:6783
req_id = 34df2e1f-7306-405c-b166-101ca139b5e3
|
| 857 | 2026-01-14T21:22:38.130Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 2388,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:6783
req_id = 34df2e1f-7306-405c-b166-101ca139b5e3
|
| 858 | 2026-01-14T21:22:38.138Z | ERRO | test_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = multicast_reconciler
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 859 | 2026-01-14T21:22:38.139Z | ERRO | test_vpc_firewall (BackgroundTasks): failed to build DPD clients
background_task = multicast_reconciler
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 860 | 2026-01-14T21:22:38.139Z | ERRO | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed with dataplane inconsistencies
active_groups_verified = 0
background_task = multicast_reconciler
dataplane_error_count = 1
external_groups_created = 0
external_groups_deleted = 0
member_state_transitions = 0
orphaned_members_cleaned = 0
|
| 861 | 2026-01-14T21:22:38.139Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 499.930497ms
iteration = 1
status = {"disabled":false,"errors":["failed to create multicast dataplane client: Internal Error: failed to build DPD clients"],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 862 | 2026-01-14T21:22:38.140Z | WARN | test_vpc_firewall (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_internal
dns_group = internal
error = proto error: no records found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 863 | 2026-01-14T21:22:38.140Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 492.982006ms
iteration = 1
status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 864 | 2026-01-14T21:22:38.140Z | WARN | test_vpc_firewall (BackgroundTasks): failed to lookup DNS servers
background_task = dns_servers_external
dns_group = external
error = proto error: no records found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 865 | 2026-01-14T21:22:38.140Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 489.956934ms
iteration = 1
status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 866 | 2026-01-14T21:22:38.141Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 867 | 2026-01-14T21:22:38.141Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 868 | 2026-01-14T21:22:38.141Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 869 | 2026-01-14T21:22:38.141Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 870 | 2026-01-14T21:22:38.143Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 871 | 2026-01-14T21:22:38.144Z | ERRO | test_vpc_firewall (BackgroundTasks): failed to resolve MGS addresses
background_task = sp_ereport_ingester
error = Resolve(ResolveError { kind: Proto(ProtoError { kind: NoRecordsFound { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, soa: None, ns: None, negative_ttl: None, response_code: ServFail, trusted: true, authorities: None } }) })
|
| 872 | 2026-01-14T21:22:38.145Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = sp_ereport_ingester
elapsed = 261.152181ms
iteration = 1
status = {"disabled":false,"errors":["failed to resolve MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"],"sps":[]}
|
| 873 | 2026-01-14T21:22:38.147Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 874 | 2026-01-14T21:22:38.147Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 875 | 2026-01-14T21:22:38.147Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 876 | 2026-01-14T21:22:38.147Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 877 | 2026-01-14T21:22:38.148Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 878 | 2026-01-14T21:22:38.152Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 879 | 2026-01-14T21:22:38.152Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 880 | 2026-01-14T21:22:38.152Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 881 | 2026-01-14T21:22:38.152Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 882 | 2026-01-14T21:22:38.154Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 883 | 2026-01-14T21:22:38.162Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 884 | 2026-01-14T21:22:38.186Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
result = Ok(())
|
| 885 | 2026-01-14T21:22:38.187Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 886 | 2026-01-14T21:22:38.187Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 887 | 2026-01-14T21:22:38.188Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 888 | 2026-01-14T21:22:38.229Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_mgd_switch0
|
| 889 | 2026-01-14T21:22:38.230Z | DEBG | test_vpc_firewall: Starting mgd for switch0
|
| 890 | 2026-01-14T21:22:38.253Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 891 | 2026-01-14T21:22:38.261Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
result = Ok(())
|
| 892 | 2026-01-14T21:22:38.261Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 893 | 2026-01-14T21:22:38.261Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 894 | 2026-01-14T21:22:38.262Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 895 | 2026-01-14T21:22:38.269Z | INFO | test_vpc_firewall (BackgroundTasks): Metric producer GC complete (no errors)
background_task = metrics_producer_gc
expiration = 2026-01-14 21:12:37.651535994 UTC
pruned = {}
|
| 896 | 2026-01-14T21:22:38.270Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = metrics_producer_gc
elapsed = 618.740957ms
iteration = 1
status = {"expiration":"2026-01-14T21:12:37.651535994Z","pruned":[]}
|
| 897 | 2026-01-14T21:22:38.294Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 898 | 2026-01-14T21:22:38.311Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
result = Ok(())
|
| 899 | 2026-01-14T21:22:38.311Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 900 | 2026-01-14T21:22:38.311Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 901 | 2026-01-14T21:22:38.311Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 902 | 2026-01-14T21:22:38.314Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 903 | 2026-01-14T21:22:38.319Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 904 | 2026-01-14T21:22:38.319Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 905 | 2026-01-14T21:22:38.319Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 906 | 2026-01-14T21:22:38.319Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 907 | 2026-01-14T21:22:38.319Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 908 | 2026-01-14T21:22:38.320Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 909 | 2026-01-14T21:22:38.326Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 910 | 2026-01-14T21:22:38.333Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 911 | 2026-01-14T21:22:38.333Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 912 | 2026-01-14T21:22:38.333Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 913 | 2026-01-14T21:22:38.334Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 914 | 2026-01-14T21:22:38.335Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 915 | 2026-01-14T21:22:38.336Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_ipv6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 916 | 2026-01-14T21:22:38.337Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 917 | 2026-01-14T21:22:38.344Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 918 | 2026-01-14T21:22:38.345Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 919 | 2026-01-14T21:22:38.345Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 920 | 2026-01-14T21:22:38.345Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 921 | 2026-01-14T21:22:38.374Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = phantom_disks
elapsed = 696.131741ms
iteration = 1
status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
|
| 922 | 2026-01-14T21:22:38.407Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 923 | 2026-01-14T21:22:38.414Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Fleet
result = Ok(())
|
| 924 | 2026-01-14T21:22:38.414Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
|
| 925 | 2026-01-14T21:22:38.414Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = instance_watcher
roles = RoleSet { roles: {} }
|
| 926 | 2026-01-14T21:22:38.415Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_watcher
resource = Database
result = Ok(())
|
| 927 | 2026-01-14T21:22:38.433Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: af 99 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:62550
req_id = 1570770d-4ebf-481f-bc1f-774cfe37267f
|
| 928 | 2026-01-14T21:22:38.433Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 44953,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:62550
req_id = 1570770d-4ebf-481f-bc1f-774cfe37267f
|
| 929 | 2026-01-14T21:22:38.433Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 44953,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:62550
req_id = 1570770d-4ebf-481f-bc1f-774cfe37267f
|
| 930 | 2026-01-14T21:22:38.434Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 1d 4c 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .L..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:10523
req_id = 28517b4f-91c3-4fcd-b3d1-950da071f0e4
|
| 931 | 2026-01-14T21:22:38.434Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 7500,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:10523
req_id = 28517b4f-91c3-4fcd-b3d1-950da071f0e4
|
| 932 | 2026-01-14T21:22:38.434Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 7500,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_dendrite._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_dendrite._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
9,
95,
100,
101,
110,
100,
114,
105,
116,
101,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:10523
req_id = 28517b4f-91c3-4fcd-b3d1-950da071f0e4
|
| 933 | 2026-01-14T21:22:38.443Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 934 | 2026-01-14T21:22:38.452Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Fleet
result = Ok(())
|
| 935 | 2026-01-14T21:22:38.452Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
|
| 936 | 2026-01-14T21:22:38.452Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = switch_port_config_manager
roles = RoleSet { roles: {} }
|
| 937 | 2026-01-14T21:22:38.452Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = switch_port_config_manager
resource = Database
result = Ok(())
|
| 938 | 2026-01-14T21:22:38.506Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 939 | 2026-01-14T21:22:38.506Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 940 | 2026-01-14T21:22:38.508Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 941 | 2026-01-14T21:22:38.513Z | ERRO | test_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = nat_garbage_collector
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 942 | 2026-01-14T21:22:38.514Z | ERRO | test_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = nat_garbage_collector
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 943 | 2026-01-14T21:22:38.514Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = nat_garbage_collector
elapsed = 844.327069ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 944 | 2026-01-14T21:22:38.515Z | ERRO | test_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = bfd_manager
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 945 | 2026-01-14T21:22:38.515Z | ERRO | test_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services
background_task = bfd_manager
error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 946 | 2026-01-14T21:22:38.516Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = bfd_manager
elapsed = 839.167217ms
iteration = 1
status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 947 | 2026-01-14T21:22:38.544Z | DEBG | test_vpc_firewall: mgd port is 39674
|
| 948 | 2026-01-14T21:22:38.544Z | DEBG | test_vpc_firewall (init_with_steps): Running step record_switch_dns
|
| 949 | 2026-01-14T21:22:38.544Z | DEBG | test_vpc_firewall: Recording DNS for the switch zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
switch_location = switch0
|
| 950 | 2026-01-14T21:22:38.544Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_sled1
|
| 951 | 2026-01-14T21:22:38.545Z | INFO | test_vpc_firewall (omicron_sled_agent::sim::Server): setting up sled agent server
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 952 | 2026-01-14T21:22:38.660Z | INFO | test_vpc_firewall (SledAgent): created simulated sled agent
server = b6d65341-167c-41df-9b5c-41cded99c229
sim_mode = Explicit
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 953 | 2026-01-14T21:22:38.661Z | INFO | test_vpc_firewall (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
|
| 954 | 2026-01-14T21:22:38.676Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = lookup_region_port
elapsed = 850.171008ms
iteration = 1
status = {"errors":[],"found_port_ok":[]}
|
| 955 | 2026-01-14T21:22:38.688Z | INFO | test_vpc_firewall (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmp3wosp4/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 956 | 2026-01-14T21:22:38.688Z | DEBG | test_vpc_firewall (ArtifactStore): Failed to read ledger: Not found in storage
path = /var/tmp/omicron_tmp/.tmp3wosp4/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 957 | 2026-01-14T21:22:38.688Z | INFO | test_vpc_firewall (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpDRDbDf/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 958 | 2026-01-14T21:22:38.688Z | DEBG | test_vpc_firewall (ArtifactStore): Failed to read ledger: Not found in storage
path = /var/tmp/omicron_tmp/.tmpDRDbDf/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 959 | 2026-01-14T21:22:38.800Z | DEBG | test_vpc_firewall (dropshot (Repo Depot)): registered endpoint
local_addr = [::1]:52160
method = GET
path = /artifact/sha256/{sha256}
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 960 | 2026-01-14T21:22:38.800Z | INFO | test_vpc_firewall (dropshot (Repo Depot)): listening
local_addr = [::1]:52160
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 961 | 2026-01-14T21:22:38.804Z | DEBG | test_vpc_firewall (dropshot (Repo Depot)): successfully registered DTrace USDT probes
local_addr = [::1]:52160
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 962 | 2026-01-14T21:22:38.822Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /artifacts
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 963 | 2026-01-14T21:22:38.822Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /artifacts/{sha256}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 964 | 2026-01-14T21:22:38.822Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /artifacts/{sha256}/copy-from-depot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 965 | 2026-01-14T21:22:38.822Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /artifacts-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 966 | 2026-01-14T21:22:38.822Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /artifacts-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 967 | 2026-01-14T21:22:38.822Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /bootstore/status
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 968 | 2026-01-14T21:22:38.822Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /chicken-switch/destroy-orphaned-datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 2.0.0
|
| 969 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /chicken-switch/destroy-orphaned-datasets
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 3.0.0
|
| 970 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /debug/switch-zone-policy
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 3.0.0
|
| 971 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /debug/switch-zone-policy
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 3.0.0
|
| 972 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /disks/{disk_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 973 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /disks/{disk_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 974 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /eip-gateways
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 975 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 12.0.0
|
| 976 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 11.0.0 to 12.0.0
|
| 977 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 978 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 4.0.0 to 10.0.0
|
| 979 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /inventory
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 4.0.0
|
| 980 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = DELETE
path = /local-storage/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 9.0.0
|
| 981 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /local-storage/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 9.0.0
|
| 982 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 983 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /network-bootstore-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 984 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 11.0.0
|
| 985 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 986 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 4.0.0 to 10.0.0
|
| 987 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /omicron-config
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 4.0.0
|
| 988 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /probes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 10.0.0
|
| 989 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /probes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 6.0.0 to 10.0.0
|
| 990 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /sled-identifiers
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 991 | 2026-01-14T21:22:38.823Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /sled-role
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 8.0.0
|
| 992 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /sleds
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 993 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/dladm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 994 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/health-check
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 995 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/ipadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 996 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/logs/download/{zone}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 997 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/logs/zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 998 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/nvmeadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 999 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/pargs-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1000 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/pfiles-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1001 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/pstack-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1002 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/zfs-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1003 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/zoneadm-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1004 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support/zpool-info
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1005 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1006 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = DELETE
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1007 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1008 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1009 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1010 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1011 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1012 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/finalize
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1013 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1014 | 2026-01-14T21:22:38.824Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = HEAD
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1015 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/transfer
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1016 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /switch-ports
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1017 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = DELETE
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1018 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1019 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /v2p
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1020 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = DELETE
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1021 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 11.0.0
|
| 1022 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 10.0.0 to 11.0.0
|
| 1023 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 9.0.0 to 10.0.0
|
| 1024 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = from 7.0.0 to 9.0.0
|
| 1025 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vmms/{propolis_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 7.0.0
|
| 1026 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /vmms/{propolis_id}/disks/{disk_id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1027 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = DELETE
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1028 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vmms/{propolis_id}/external-ip
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1029 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = DELETE
path = /vmms/{propolis_id}/multicast-group
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 7.0.0
|
| 1030 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vmms/{propolis_id}/multicast-group
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 7.0.0
|
| 1031 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /vmms/{propolis_id}/poke
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1032 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /vmms/{propolis_id}/poke-single-step
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1033 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /vmms/{propolis_id}/sim-migration-source
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1034 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1035 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vmms/{propolis_id}/state
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1036 | 2026-01-14T21:22:38.825Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all starting from 10.0.0
|
| 1037 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vpc/{vpc_id}/firewall/rules
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all ending with 10.0.0
|
| 1038 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1039 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /vpc-routes
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1040 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /zones
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1041 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = POST
path = /zones/bundle-cleanup
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1042 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1043 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = PUT
path = /zones/bundle-cleanup/context
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1044 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /zones/bundle-cleanup/utilization
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1045 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /zones/bundles
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1046 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /zones/bundles/{zone_name}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1047 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = DELETE
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1048 | 2026-01-14T21:22:38.826Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:60096
method = GET
path = /zones/bundles/{zone_name}/{bundle_id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1049 | 2026-01-14T21:22:38.826Z | INFO | test_vpc_firewall (dropshot): listening
local_addr = [::1]:60096
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1050 | 2026-01-14T21:22:38.831Z | DEBG | test_vpc_firewall (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:60096
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1051 | 2026-01-14T21:22:38.833Z | DEBG | test_vpc_firewall (omicron_sled_agent::sim::Server): contacting server nexus
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1052 | 2026-01-14T21:22:38.833Z | DEBG | test_vpc_firewall (NexusClient): client request
body = Some(Body)
method = POST
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = http://127.0.0.1:45286/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1053 | 2026-01-14T21:22:38.844Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
|
| 1054 | 2026-01-14T21:22:38.844Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_replacement
roles = RoleSet { roles: {} }
|
| 1055 | 2026-01-14T21:22:38.846Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement
resource = Database
result = Ok(())
|
| 1056 | 2026-01-14T21:22:38.854Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
|
| 1057 | 2026-01-14T21:22:38.854Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_replacement_driver
roles = RoleSet { roles: {} }
|
| 1058 | 2026-01-14T21:22:38.855Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_replacement_driver
resource = Database
result = Ok(())
|
| 1059 | 2026-01-14T21:22:38.860Z | INFO | test_vpc_firewall (dropshot_internal): accepted connection
local_addr = 127.0.0.1:45286
remote_addr = 127.0.0.1:54711
|
| 1060 | 2026-01-14T21:22:38.860Z | INFO | test_vpc_firewall (dropshot_internal): accepted connection
local_addr = 127.0.0.1:45286
remote_addr = 127.0.0.1:63833
|
| 1061 | 2026-01-14T21:22:38.863Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:54711
req_id = 9dfddb8c-db08-44ce-ad3d-fad3dd2da271
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1062 | 2026-01-14T21:22:38.863Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:54711
req_id = 9dfddb8c-db08-44ce-ad3d-fad3dd2da271
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
version = 1.0.0
|
| 1063 | 2026-01-14T21:22:38.864Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:63833
req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53
uri = /nat/ipv4/changeset/0?limit=100
|
| 1064 | 2026-01-14T21:22:38.864Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:63833
req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53
uri = /nat/ipv4/changeset/0?limit=100
version = 1.0.0
|
| 1065 | 2026-01-14T21:22:38.887Z | INFO | test_vpc_firewall (nexus): registered sled agent
sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1066 | 2026-01-14T21:22:38.897Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:63833
req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53
resource = Database
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 1067 | 2026-01-14T21:22:38.903Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:63833
req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53
roles = RoleSet { roles: {} }
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 1068 | 2026-01-14T21:22:38.904Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:63833
req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53
resource = Database
result = Ok(())
type = user_builtin
uri = /nat/ipv4/changeset/0?limit=100
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 1069 | 2026-01-14T21:22:38.921Z | INFO | test_vpc_firewall (SagaRecoverer): listed in-progress sagas
count = 0
|
| 1070 | 2026-01-14T21:22:38.921Z | INFO | test_vpc_firewall (SagaQuiesceHandle): saga recovery pass finished
blueprint_id = None
generation = 1
|
| 1071 | 2026-01-14T21:22:38.921Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = saga_recovery
elapsed = 1.224953104s
iteration = 1
status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
|
| 1072 | 2026-01-14T21:22:38.922Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
|
| 1073 | 2026-01-14T21:22:38.922Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_snapshot_replacement_start
roles = RoleSet { roles: {} }
|
| 1074 | 2026-01-14T21:22:38.923Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_start
resource = Database
result = Ok(())
|
| 1075 | 2026-01-14T21:22:38.925Z | DEBG | test_vpc_firewall (BackgroundTasks): Found abandoned VMMs
background_task = abandoned_vmm_reaper
count = 0
total = 0
|
| 1076 | 2026-01-14T21:22:38.925Z | INFO | test_vpc_firewall (BackgroundTasks): Abandoned VMMs reaped
background_task = abandoned_vmm_reaper
sled_reservations_deleted = 0
vmms_already_deleted = 0
vmms_deleted = 0
vmms_found = 0
|
| 1077 | 2026-01-14T21:22:38.925Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = abandoned_vmm_reaper
elapsed = 1.231017416s
iteration = 1
status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
|
| 1078 | 2026-01-14T21:22:38.926Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_garbage_collection
elapsed = 1.064349532s
iteration = 1
status = {"errors":[],"garbage_collect_requested":[]}
|
| 1079 | 2026-01-14T21:22:38.926Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 1080 | 2026-01-14T21:22:38.926Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 1081 | 2026-01-14T21:22:38.927Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 1082 | 2026-01-14T21:22:38.932Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1083 | 2026-01-14T21:22:38.932Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1084 | 2026-01-14T21:22:38.934Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1085 | 2026-01-14T21:22:39.022Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1086 | 2026-01-14T21:22:39.031Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
result = Ok(())
|
| 1087 | 2026-01-14T21:22:39.032Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
|
| 1088 | 2026-01-14T21:22:39.034Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = probe_distributor
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1089 | 2026-01-14T21:22:39.035Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 1090 | 2026-01-14T21:22:39.035Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 1091 | 2026-01-14T21:22:39.036Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 1092 | 2026-01-14T21:22:39.038Z | INFO | test_vpc_firewall (BackgroundTasks): all webhook delivery tasks completed
background_task = webhook_deliverator
num_receivers = 0
|
| 1093 | 2026-01-14T21:22:39.039Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = webhook_deliverator
elapsed = 1.162744013s
iteration = 1
status = {"by_rx":{},"error":null}
|
| 1094 | 2026-01-14T21:22:39.044Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1095 | 2026-01-14T21:22:39.073Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 1096 | 2026-01-14T21:22:39.099Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = read_only_region_replacement_start
elapsed = 1.230771343s
iteration = 1
status = {"errors":[],"requests_created_ok":[]}
|
| 1097 | 2026-01-14T21:22:39.162Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_finish
elapsed = 1.296338842s
iteration = 1
status = {"errors":[],"finish_invoked_ok":[]}
|
| 1098 | 2026-01-14T21:22:39.186Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1099 | 2026-01-14T21:22:39.191Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1100 | 2026-01-14T21:22:39.191Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1101 | 2026-01-14T21:22:39.191Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1102 | 2026-01-14T21:22:39.192Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1103 | 2026-01-14T21:22:39.193Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
|
| 1104 | 2026-01-14T21:22:39.194Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1105 | 2026-01-14T21:22:39.194Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1106 | 2026-01-14T21:22:39.194Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1107 | 2026-01-14T21:22:39.194Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1108 | 2026-01-14T21:22:39.229Z | DEBG | test_vpc_firewall (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
| 1109 | 2026-01-14T21:22:39.229Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 1110 | 2026-01-14T21:22:39.230Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 50 4b 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 PK..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:44545
req_id = 5b9a70a2-3591-4377-918b-315e2cde0eda
|
| 1111 | 2026-01-14T21:22:39.230Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 20555,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:44545
req_id = 5b9a70a2-3591-4377-918b-315e2cde0eda
|
| 1112 | 2026-01-14T21:22:39.230Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 20555,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_mgs._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_mgs._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
4,
95,
109,
103,
115,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal."
kind = dns
peer_addr = [::1]:44545
req_id = 5b9a70a2-3591-4377-918b-315e2cde0eda
|
| 1113 | 2026-01-14T21:22:39.255Z | WARN | test_vpc_firewall (BackgroundTasks): inventory collection failed
background_task = inventory_collection
error = failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
|
| 1114 | 2026-01-14T21:22:39.255Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 1.64084051s
iteration = 1
status = {"error":"failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
|
| 1115 | 2026-01-14T21:22:39.256Z | TRAC | test_vpc_firewall (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = instance failed
total_found = 0
|
| 1116 | 2026-01-14T21:22:39.256Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
|
| 1117 | 2026-01-14T21:22:39.256Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = instance_reincarnation
roles = RoleSet { roles: {} }
|
| 1118 | 2026-01-14T21:22:39.257Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = instance_reincarnation
resource = Database
result = Ok(())
|
| 1119 | 2026-01-14T21:22:39.258Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = inventory_loader
elapsed = 1.639590751s
iteration = 1
status = "NoCollections"
|
| 1120 | 2026-01-14T21:22:39.259Z | WARN | test_vpc_firewall (BackgroundTasks): failed to read target blueprint
background_task = blueprint_loader
error = Internal Error: no target blueprint set
|
| 1121 | 2026-01-14T21:22:39.259Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_loader
elapsed = 1.637821009s
iteration = 1
status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
|
| 1122 | 2026-01-14T21:22:39.260Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1123 | 2026-01-14T21:22:39.265Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1124 | 2026-01-14T21:22:39.265Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1125 | 2026-01-14T21:22:39.265Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1126 | 2026-01-14T21:22:39.265Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1127 | 2026-01-14T21:22:39.265Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1128 | 2026-01-14T21:22:39.266Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1129 | 2026-01-14T21:22:39.293Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1130 | 2026-01-14T21:22:39.301Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 1131 | 2026-01-14T21:22:39.303Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1132 | 2026-01-14T21:22:39.310Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
result = Ok(())
|
| 1133 | 2026-01-14T21:22:39.310Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 1134 | 2026-01-14T21:22:39.311Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 1135 | 2026-01-14T21:22:39.311Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 1136 | 2026-01-14T21:22:39.314Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1137 | 2026-01-14T21:22:39.318Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 1138 | 2026-01-14T21:22:39.320Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = switch_port_config_manager
elapsed = 1.638704527s
iteration = 1
status = {}
|
| 1139 | 2026-01-14T21:22:39.321Z | DEBG | test_vpc_firewall (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-14T21:22:37.508570Z })
|
| 1140 | 2026-01-14T21:22:39.321Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 1.642030681s
iteration = 1
status = {"config_updated":true}
|
| 1141 | 2026-01-14T21:22:39.321Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 2
reason = Dependency
|
| 1142 | 2026-01-14T21:22:39.321Z | DEBG | test_vpc_firewall (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 1143 | 2026-01-14T21:22:39.321Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 36.302\u{b5}s
iteration = 2
status = "Disabled"
|
| 1144 | 2026-01-14T21:22:39.321Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = tuf_repo_pruner
iteration = 2
reason = Dependency
|
| 1145 | 2026-01-14T21:22:39.321Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
|
| 1146 | 2026-01-14T21:22:39.321Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1147 | 2026-01-14T21:22:39.321Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1148 | 2026-01-14T21:22:39.321Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1149 | 2026-01-14T21:22:39.322Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1150 | 2026-01-14T21:22:39.328Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1151 | 2026-01-14T21:22:39.328Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1152 | 2026-01-14T21:22:39.329Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1153 | 2026-01-14T21:22:39.341Z | WARN | test_vpc_firewall (BackgroundTasks): failed to read DNS config
background_task = dns_config_internal
dns_group = internal
error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
|
| 1154 | 2026-01-14T21:22:39.341Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 1.697985648s
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
|
| 1155 | 2026-01-14T21:22:39.387Z | INFO | test_vpc_firewall (BackgroundTasks): all instance checks complete
background_task = instance_watcher
pruned_instances = 0
total_completed = 0
total_failed = 0
total_incomplete = 0
total_instances = 0
update_sagas_queued = 0
|
| 1156 | 2026-01-14T21:22:39.387Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = instance_watcher
elapsed = 1.697924558s
iteration = 1
status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
|
| 1157 | 2026-01-14T21:22:39.388Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
|
| 1158 | 2026-01-14T21:22:39.388Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = support_bundle_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1159 | 2026-01-14T21:22:39.388Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 1160 | 2026-01-14T21:22:39.388Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 1161 | 2026-01-14T21:22:39.389Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 1162 | 2026-01-14T21:22:39.390Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 1163 | 2026-01-14T21:22:39.391Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 1164 | 2026-01-14T21:22:39.391Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 1165 | 2026-01-14T21:22:39.441Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1166 | 2026-01-14T21:22:39.450Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
result = Ok(())
|
| 1167 | 2026-01-14T21:22:39.451Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 1168 | 2026-01-14T21:22:39.451Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 1169 | 2026-01-14T21:22:39.452Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 1170 | 2026-01-14T21:22:39.483Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1171 | 2026-01-14T21:22:39.489Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1172 | 2026-01-14T21:22:39.490Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1173 | 2026-01-14T21:22:39.490Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1174 | 2026-01-14T21:22:39.490Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1175 | 2026-01-14T21:22:39.515Z | TRAC | test_vpc_firewall (BackgroundTasks): reprocessing 0 outdated webhook globs...
background_task = alert_dispatcher
|
| 1176 | 2026-01-14T21:22:39.516Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
|
| 1177 | 2026-01-14T21:22:39.516Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = alert_dispatcher
roles = RoleSet { roles: {} }
|
| 1178 | 2026-01-14T21:22:39.517Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = alert_dispatcher
resource = Database
result = Ok(())
|
| 1179 | 2026-01-14T21:22:39.519Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = region_replacement
elapsed = 1.832553983s
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
| 1180 | 2026-01-14T21:22:39.527Z | WARN | test_vpc_firewall (BackgroundTasks): failed to read DNS config
background_task = dns_config_external
dns_group = external
error = Internal Error: expected exactly one latest version for DNS group External, found 0
|
| 1181 | 2026-01-14T21:22:39.527Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 1.87876659s
iteration = 1
status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
|
| 1182 | 2026-01-14T21:22:39.527Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = fm_sitrep_loader
elapsed = 1.643209482s
iteration = 1
status = "NoSitrep"
|
| 1183 | 2026-01-14T21:22:39.649Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 785714
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:63833
req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53
response_code = 200
uri = /nat/ipv4/changeset/0?limit=100
|
| 1184 | 2026-01-14T21:22:39.722Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = region_replacement_driver
elapsed = 2.03452555s
iteration = 1
status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
|
| 1185 | 2026-01-14T21:22:39.742Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
|
| 1186 | 2026-01-14T21:22:39.752Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = region_snapshot_replacement_step
roles = RoleSet { roles: {} }
|
| 1187 | 2026-01-14T21:22:39.754Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = region_snapshot_replacement_step
resource = Database
result = Ok(())
|
| 1188 | 2026-01-14T21:22:39.758Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1189 | 2026-01-14T21:22:39.763Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Fleet
result = Ok(())
|
| 1190 | 2026-01-14T21:22:39.764Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
|
| 1191 | 2026-01-14T21:22:39.764Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = support_bundle_collector
roles = RoleSet { roles: {} }
|
| 1192 | 2026-01-14T21:22:39.764Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = support_bundle_collector
resource = Database
result = Ok(())
|
| 1193 | 2026-01-14T21:22:39.766Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1194 | 2026-01-14T21:22:39.771Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
result = Ok(())
|
| 1195 | 2026-01-14T21:22:39.771Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1196 | 2026-01-14T21:22:39.771Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1197 | 2026-01-14T21:22:39.771Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1198 | 2026-01-14T21:22:39.774Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_start
elapsed = 1.91506952s
iteration = 1
status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
|
| 1199 | 2026-01-14T21:22:39.779Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 1200 | 2026-01-14T21:22:39.779Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1201 | 2026-01-14T21:22:39.779Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 1202 | 2026-01-14T21:22:39.779Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 1203 | 2026-01-14T21:22:39.780Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 1204 | 2026-01-14T21:22:39.784Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1205 | 2026-01-14T21:22:39.784Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1206 | 2026-01-14T21:22:39.784Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1207 | 2026-01-14T21:22:39.784Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1208 | 2026-01-14T21:22:39.785Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1209 | 2026-01-14T21:22:39.814Z | TRAC | test_vpc_firewall (BackgroundTasks): webhook dispatching completed successfully
background_task = alert_dispatcher
events_dispatched = 0
events_without_receivers = 0
|
| 1210 | 2026-01-14T21:22:39.814Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = alert_dispatcher
elapsed = 1.944346724s
iteration = 1
status = {"dispatched":[],"errors":[],"glob_version":"215.0.0","globs_reprocessed":{},"no_receivers":[]}
|
| 1211 | 2026-01-14T21:22:39.895Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1212 | 2026-01-14T21:22:39.895Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1213 | 2026-01-14T21:22:39.895Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1214 | 2026-01-14T21:22:39.896Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1215 | 2026-01-14T21:22:39.909Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
|
| 1216 | 2026-01-14T21:22:39.910Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1217 | 2026-01-14T21:22:39.910Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1218 | 2026-01-14T21:22:39.910Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1219 | 2026-01-14T21:22:39.911Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1220 | 2026-01-14T21:22:39.918Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1221 | 2026-01-14T21:22:39.922Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 1222 | 2026-01-14T21:22:39.931Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1223 | 2026-01-14T21:22:39.931Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1224 | 2026-01-14T21:22:39.932Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1225 | 2026-01-14T21:22:39.933Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1226 | 2026-01-14T21:22:40.037Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = region_snapshot_replacement_step
elapsed = 2.173837068s
iteration = 1
status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
|
| 1227 | 2026-01-14T21:22:40.043Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1228 | 2026-01-14T21:22:40.055Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
| 1229 | 2026-01-14T21:22:40.055Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 1230 | 2026-01-14T21:22:40.055Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 1231 | 2026-01-14T21:22:40.055Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 1232 | 2026-01-14T21:22:40.142Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = inventory_collection
iteration = 2
reason = Signaled
|
| 1233 | 2026-01-14T21:22:40.142Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 1234 | 2026-01-14T21:22:40.143Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1235 | 2026-01-14T21:22:40.143Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1236 | 2026-01-14T21:22:40.143Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1237 | 2026-01-14T21:22:40.144Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1238 | 2026-01-14T21:22:40.145Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 1282366
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:54711
req_id = 9dfddb8c-db08-44ce-ad3d-fad3dd2da271
response_code = 204
uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
|
| 1239 | 2026-01-14T21:22:40.146Z | INFO | test_vpc_firewall (BackgroundTasks): No bundles to collect
background_task = support_bundle_collector
|
| 1240 | 2026-01-14T21:22:40.146Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = support_bundle_collector
elapsed = 2.515459851s
iteration = 1
status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
|
| 1241 | 2026-01-14T21:22:40.147Z | DEBG | test_vpc_firewall (NexusClient): client response
result = Ok(Response { url: "http://127.0.0.1:45286/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "9dfddb8c-db08-44ce-ad3d-fad3dd2da271", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1242 | 2026-01-14T21:22:40.147Z | DEBG | test_vpc_firewall (init_with_steps): Running step configure_boundary_ntp
|
| 1243 | 2026-01-14T21:22:40.148Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_crucible_pantry
|
| 1244 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = GET
path = /crucible/pantry/0
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1245 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = GET
path = /crucible/pantry/0/job/{id}/is-finished
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1246 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = GET
path = /crucible/pantry/0/job/{id}/ok
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1247 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = DELETE
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1248 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = GET
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1249 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = POST
path = /crucible/pantry/0/volume/{id}
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1250 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = POST
path = /crucible/pantry/0/volume/{id}/background
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1251 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = POST
path = /crucible/pantry/0/volume/{id}/bulk-write
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1252 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = POST
path = /crucible/pantry/0/volume/{id}/import-from-url
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1253 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = POST
path = /crucible/pantry/0/volume/{id}/scrub
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1254 | 2026-01-14T21:22:40.150Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
kind = pantry
local_addr = [::1]:60375
method = POST
path = /crucible/pantry/0/volume/{id}/snapshot
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
versions = all
|
| 1255 | 2026-01-14T21:22:40.150Z | INFO | test_vpc_firewall (dropshot): listening
kind = pantry
local_addr = [::1]:60375
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1256 | 2026-01-14T21:22:40.151Z | DEBG | test_vpc_firewall (dropshot): successfully registered DTrace USDT probes
kind = pantry
local_addr = [::1]:60375
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1257 | 2026-01-14T21:22:40.151Z | INFO | test_vpc_firewall (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry
address = [::1]:60375
kind = pantry
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1258 | 2026-01-14T21:22:40.151Z | DEBG | test_vpc_firewall (init_with_steps): Running step populate_internal_dns
|
| 1259 | 2026-01-14T21:22:40.152Z | DEBG | test_vpc_firewall: Populating Internal DNS
|
| 1260 | 2026-01-14T21:22:40.242Z | INFO | test_vpc_firewall: DNS population: DnsConfigParams {
generation: Generation(
1,
),
serial: 1,
time_created: 2026-01-14T21:22:40.241223935Z,
zones: [
DnsConfigZone {
zone_name: "control-plane.oxide.internal",
records: {
"4ca13454-dc8a-4ce2-981d-d389027c56d3.host": [
Aaaa(
::1,
),
],
"_nexus._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 45286,
target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal",
},
),
],
"_boundary-ntp._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 123,
target: "541d5209-e75f-4f24-a362-01ff39fdfcab.host.control-plane.oxide.internal",
},
),
],
"b6d65341-167c-41df-9b5c-41cded99c229.sled": [
Aaaa(
::1,
),
],
"_mgd._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 39674,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"boundary-ntp": [
Aaaa(
::1,
),
],
"_repo-depot._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 52160,
target: "b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal",
},
),
],
"3336d418-9683-4f43-b194-7d4037731737.host": [
Aaaa(
::1,
),
],
"_clickhouse-native._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 9000,
target: "3336d418-9683-4f43-b194-7d4037731737.host.control-plane.oxide.internal",
},
),
],
"077622b5-37ad-4801-a59d-22b17b3a7e04.host": [
Aaaa(
::1,
),
],
"_cockroach._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 46432,
target: "4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal",
},
),
],
"6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host": [
Aaaa(
::1,
),
],
"_external-dns._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 41277,
target: "6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal",
},
),
],
"_oximeter-reader._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 9000,
target: "3336d418-9683-4f43-b194-7d4037731737.host.control-plane.oxide.internal",
},
),
],
"@": [
Ns(
"ns1.control-plane.oxide.internal",
),
],
"_clickhouse._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 64361,
target: "3336d418-9683-4f43-b194-7d4037731737.host.control-plane.oxide.internal",
},
),
],
"_dendrite._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 65194,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
"ns1": [
Aaaa(
::1,
),
],
"dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [
Aaaa(
::1,
),
],
"_nexus-lockstep._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 36202,
target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal",
},
),
],
"_crucible-pantry._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 60375,
target: "077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal",
},
),
],
"541d5209-e75f-4f24-a362-01ff39fdfcab.host": [
Aaaa(
::1,
),
],
"0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host": [
Aaaa(
::1,
),
],
"913233fe-92a8-4635-9572-183f495429c4.host": [
Aaaa(
::ffff:127.0.0.1,
),
],
"_clickhouse-admin-single-server._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 8888,
target: "3336d418-9683-4f43-b194-7d4037731737.host.control-plane.oxide.internal",
},
),
],
"_nameservice._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 43592,
target: "0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal",
},
),
],
"_mgs._tcp": [
Srv(
Srv {
prio: 0,
weight: 0,
port: 59250,
target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal",
},
),
],
},
},
],
}
|
| 1261 | 2026-01-14T21:22:40.262Z | DEBG | test_vpc_firewall: client request
body = Some(Body)
method = PUT
uri = http://[::1]:43592/config
|
| 1262 | 2026-01-14T21:22:40.407Z | INFO | test_vpc_firewall (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
|
| 1263 | 2026-01-14T21:22:40.407Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:60096/vpc-routes
|
| 1264 | 2026-01-14T21:22:40.407Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1265 | 2026-01-14T21:22:40.417Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1266 | 2026-01-14T21:22:40.418Z | TRAC | test_vpc_firewall (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
| 1267 | 2026-01-14T21:22:40.418Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1268 | 2026-01-14T21:22:40.418Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1269 | 2026-01-14T21:22:40.418Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1270 | 2026-01-14T21:22:40.418Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1271 | 2026-01-14T21:22:40.418Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1272 | 2026-01-14T21:22:40.420Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
|
| 1273 | 2026-01-14T21:22:40.420Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = probe_distributor
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1274 | 2026-01-14T21:22:40.420Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 1275 | 2026-01-14T21:22:40.420Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 1276 | 2026-01-14T21:22:40.420Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 1277 | 2026-01-14T21:22:40.422Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
|
| 1278 | 2026-01-14T21:22:40.422Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1279 | 2026-01-14T21:22:40.423Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1280 | 2026-01-14T21:22:40.423Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1281 | 2026-01-14T21:22:40.423Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1282 | 2026-01-14T21:22:40.424Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1283 | 2026-01-14T21:22:40.429Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 1284 | 2026-01-14T21:22:40.429Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1285 | 2026-01-14T21:22:40.429Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1286 | 2026-01-14T21:22:40.429Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1287 | 2026-01-14T21:22:40.511Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1288 | 2026-01-14T21:22:40.511Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1289 | 2026-01-14T21:22:40.511Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1290 | 2026-01-14T21:22:40.511Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1291 | 2026-01-14T21:22:40.512Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1292 | 2026-01-14T21:22:40.514Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1293 | 2026-01-14T21:22:40.520Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Fleet
result = Ok(())
|
| 1294 | 2026-01-14T21:22:40.520Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1295 | 2026-01-14T21:22:40.520Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1296 | 2026-01-14T21:22:40.520Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1297 | 2026-01-14T21:22:40.522Z | WARN | test_vpc_firewall (BackgroundTasks): failed to read Silo/DNS/TLS configuration
background_task = external_endpoints
error = Internal Error: expected at least one external DNS zone
|
| 1298 | 2026-01-14T21:22:40.523Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 2.855929014s
iteration = 1
status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
|
| 1299 | 2026-01-14T21:22:40.524Z | TRAC | test_vpc_firewall (BackgroundTasks): no more instances in need of reincarnation
background_task = instance_reincarnation
reincarnation_reason = start saga failed
total_found = 0
|
| 1300 | 2026-01-14T21:22:40.525Z | INFO | test_vpc_firewall (BackgroundTasks): instance reincarnation completed successfully
background_task = instance_reincarnation
instances_changed_state = 0
instances_found = 0
instances_reincarnated = 0
|
| 1301 | 2026-01-14T21:22:40.526Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = instance_reincarnation
elapsed = 2.834137177s
iteration = 1
status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
|
| 1302 | 2026-01-14T21:22:40.527Z | INFO | test_vpc_firewall (http): accepted connection
kind = dns
local_addr = [::1]:43592
remote_addr = [::1]:62653
|
| 1303 | 2026-01-14T21:22:40.531Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:51058
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1304 | 2026-01-14T21:22:40.533Z | DEBG | test_vpc_firewall (BackgroundTasks): deleted 0 of 0 sitreps sitreps
background_task = fm_sitrep_gc
case_ereports_deleted = 0
cases_deleted = 0
ids = []
sitreps_deleted = 0
|
| 1305 | 2026-01-14T21:22:40.533Z | TRAC | test_vpc_firewall (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted
background_task = fm_sitrep_gc
|
| 1306 | 2026-01-14T21:22:40.533Z | INFO | test_vpc_firewall (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0
background_task = fm_sitrep_gc
|
| 1307 | 2026-01-14T21:22:40.533Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = fm_sitrep_gc
elapsed = 2.893015485s
iteration = 1
status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
|
| 1308 | 2026-01-14T21:22:40.536Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:51058
req_id = a2876190-b227-4621-8a9b-84bb0db2da71
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
| 1309 | 2026-01-14T21:22:40.536Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:51058
req_id = a2876190-b227-4621-8a9b-84bb0db2da71
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
version = 12.0.0
|
| 1310 | 2026-01-14T21:22:40.537Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 904
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:51058
req_id = a2876190-b227-4621-8a9b-84bb0db2da71
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
| 1311 | 2026-01-14T21:22:40.538Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1312 | 2026-01-14T21:22:40.546Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Fleet
result = Ok(())
|
| 1313 | 2026-01-14T21:22:40.546Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
|
| 1314 | 2026-01-14T21:22:40.547Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = probe_distributor
roles = RoleSet { roles: {} }
|
| 1315 | 2026-01-14T21:22:40.547Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = probe_distributor
resource = Database
result = Ok(())
|
| 1316 | 2026-01-14T21:22:40.549Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1317 | 2026-01-14T21:22:40.549Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1318 | 2026-01-14T21:22:40.549Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1319 | 2026-01-14T21:22:40.550Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1320 | 2026-01-14T21:22:40.552Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1321 | 2026-01-14T21:22:40.561Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
| 1322 | 2026-01-14T21:22:40.561Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
|
| 1323 | 2026-01-14T21:22:40.561Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = v2p_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1324 | 2026-01-14T21:22:40.561Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1325 | 2026-01-14T21:22:40.561Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1326 | 2026-01-14T21:22:40.562Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1327 | 2026-01-14T21:22:40.564Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1328 | 2026-01-14T21:22:40.570Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1329 | 2026-01-14T21:22:40.570Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1330 | 2026-01-14T21:22:40.570Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1331 | 2026-01-14T21:22:40.571Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1332 | 2026-01-14T21:22:40.572Z | DEBG | test_vpc_firewall (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = []
|
| 1333 | 2026-01-14T21:22:40.572Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 1334 | 2026-01-14T21:22:40.574Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = TargetReleaseConfig
|
| 1335 | 2026-01-14T21:22:40.574Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_repo_pruner
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1336 | 2026-01-14T21:22:40.574Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1337 | 2026-01-14T21:22:40.574Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1338 | 2026-01-14T21:22:40.575Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1339 | 2026-01-14T21:22:40.578Z | TRAC | test_vpc_firewall (http): incoming request
kind = dns
local_addr = [::1]:43592
method = PUT
remote_addr = [::1]:62653
req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3
uri = /config
|
| 1340 | 2026-01-14T21:22:40.578Z | DEBG | test_vpc_firewall (http): determined request API version
kind = dns
local_addr = [::1]:43592
method = PUT
remote_addr = [::1]:62653
req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3
uri = /config
version = 2.0.0
|
| 1341 | 2026-01-14T21:22:40.579Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:60096/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "a2876190-b227-4621-8a9b-84bb0db2da71", "content-length": "2", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
|
| 1342 | 2026-01-14T21:22:40.579Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1343 | 2026-01-14T21:22:40.579Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1344 | 2026-01-14T21:22:40.580Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1345 | 2026-01-14T21:22:40.582Z | INFO | test_vpc_firewall (store): attempting generation update
new_generation = 1
req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3
|
| 1346 | 2026-01-14T21:22:40.582Z | INFO | test_vpc_firewall (store): pruning trees for generations newer than 0
|
| 1347 | 2026-01-14T21:22:40.582Z | DEBG | test_vpc_firewall (store): creating tree
tree_name = generation_1_zone_control-plane.oxide.internal
|
| 1348 | 2026-01-14T21:22:40.584Z | DEBG | test_vpc_firewall (store): updating current config
|
| 1349 | 2026-01-14T21:22:40.584Z | DEBG | test_vpc_firewall (store): flushing default tree
|
| 1350 | 2026-01-14T21:22:40.584Z | INFO | test_vpc_firewall (store): pruning trees for generations older than 1
keep = 3
|
| 1351 | 2026-01-14T21:22:40.584Z | INFO | test_vpc_firewall (store): updated generation
new_generation = 1
req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3
|
| 1352 | 2026-01-14T21:22:40.586Z | INFO | test_vpc_firewall (http): request completed
kind = dns
latency_us = 7520
local_addr = [::1]:43592
method = PUT
remote_addr = [::1]:62653
req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3
response_code = 204
uri = /config
|
| 1353 | 2026-01-14T21:22:40.586Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1354 | 2026-01-14T21:22:40.595Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Fleet
result = Ok(())
|
| 1355 | 2026-01-14T21:22:40.595Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
|
| 1356 | 2026-01-14T21:22:40.595Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = v2p_manager
roles = RoleSet { roles: {} }
|
| 1357 | 2026-01-14T21:22:40.595Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = v2p_manager
resource = Database
result = Ok(())
|
| 1358 | 2026-01-14T21:22:40.597Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1359 | 2026-01-14T21:22:40.597Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1360 | 2026-01-14T21:22:40.597Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1361 | 2026-01-14T21:22:40.598Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1362 | 2026-01-14T21:22:40.599Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1363 | 2026-01-14T21:22:40.599Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1364 | 2026-01-14T21:22:40.599Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1365 | 2026-01-14T21:22:40.599Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1366 | 2026-01-14T21:22:40.600Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1367 | 2026-01-14T21:22:40.602Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1368 | 2026-01-14T21:22:40.611Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = TargetReleaseConfig
result = Ok(())
|
| 1369 | 2026-01-14T21:22:40.611Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
|
| 1370 | 2026-01-14T21:22:40.612Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_repo_pruner
roles = RoleSet { roles: {} }
|
| 1371 | 2026-01-14T21:22:40.612Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_repo_pruner
resource = Database
result = Ok(())
|
| 1372 | 2026-01-14T21:22:40.676Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = probe_distributor
body = Some(Body)
method = PUT
uri = http://[::1]:60096/probes
|
| 1373 | 2026-01-14T21:22:40.678Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:43969
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1374 | 2026-01-14T21:22:40.678Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 7b 42 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 {B..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:58602
req_id = 1773b24c-1e2c-4f26-8d45-0aabb9e5ac39
|
| 1375 | 2026-01-14T21:22:40.678Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 31554,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:58602
req_id = 1773b24c-1e2c-4f26-8d45-0aabb9e5ac39
|
| 1376 | 2026-01-14T21:22:40.678Z | DEBG | test_vpc_firewall (store): query key
key = _mgs._tcp
|
| 1377 | 2026-01-14T21:22:40.679Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 1378 | 2026-01-14T21:22:40.679Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:58602
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 1773b24c-1e2c-4f26-8d45-0aabb9e5ac39
|
| 1379 | 2026-01-14T21:22:40.679Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1380 | 2026-01-14T21:22:40.692Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1381 | 2026-01-14T21:22:40.693Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1382 | 2026-01-14T21:22:40.693Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1383 | 2026-01-14T21:22:40.693Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1384 | 2026-01-14T21:22:40.696Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1385 | 2026-01-14T21:22:40.703Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1386 | 2026-01-14T21:22:40.703Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1387 | 2026-01-14T21:22:40.704Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1388 | 2026-01-14T21:22:40.705Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1389 | 2026-01-14T21:22:40.707Z | INFO | test_vpc_firewall (BackgroundTasks): tuf_repo_prune decision
background_task = tuf_repo_pruner
status = TufRepoPrunerDetails { nkeep_recent_releases: 3, nkeep_recent_uploads: 2, repos_keep_target_release: {}, repos_keep_recent_uploads: {}, repo_prune: None, other_repos_eligible_to_prune: {}, warnings: [] }
|
| 1390 | 2026-01-14T21:22:40.707Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = tuf_repo_pruner
elapsed = 1.386482777s
iteration = 2
status = {"nkeep_recent_releases":3,"nkeep_recent_uploads":2,"other_repos_eligible_to_prune":[],"repo_prune":null,"repos_keep_recent_uploads":[],"repos_keep_target_release":[],"status":"enabled","warnings":[]}
|
| 1391 | 2026-01-14T21:22:40.708Z | DEBG | test_vpc_firewall: client response
result = Ok(Response { url: "http://[::1]:43592/config", status: 204, headers: {"x-request-id": "bc84fa0a-d846-4b11-bc06-97e04e1a78a3", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
|
| 1392 | 2026-01-14T21:22:40.710Z | DEBG | test_vpc_firewall (init_with_steps): Running step configure_sled_agents
|
| 1393 | 2026-01-14T21:22:40.784Z | DEBG | test_vpc_firewall: client request
body = Some(Body)
method = PUT
uri = http://[::1]:60096/omicron-config
|
| 1394 | 2026-01-14T21:22:40.785Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10484, tv_nsec: 172483797 } })
|
| 1395 | 2026-01-14T21:22:40.785Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 1396 | 2026-01-14T21:22:40.787Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:43969
req_id = 3db35ec9-0209-45d2-b60c-23410d73a396
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /probes
|
| 1397 | 2026-01-14T21:22:40.787Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:43969
req_id = 3db35ec9-0209-45d2-b60c-23410d73a396
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /probes
version = 12.0.0
|
| 1398 | 2026-01-14T21:22:40.788Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 1543
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:43969
req_id = 3db35ec9-0209-45d2-b60c-23410d73a396
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /probes
|
| 1399 | 2026-01-14T21:22:40.789Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1400 | 2026-01-14T21:22:40.789Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1401 | 2026-01-14T21:22:40.790Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1402 | 2026-01-14T21:22:40.792Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:63174
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1403 | 2026-01-14T21:22:40.793Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = probe_distributor
result = Ok(Response { url: "http://[::1]:60096/probes", status: 204, headers: {"x-request-id": "3db35ec9-0209-45d2-b60c-23410d73a396", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
|
| 1404 | 2026-01-14T21:22:40.793Z | DEBG | test_vpc_firewall (BackgroundTasks): Update set of probes on sled
background_task = probe_distributor
n_probes = 0
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1405 | 2026-01-14T21:22:40.797Z | INFO | test_vpc_firewall (BackgroundTasks): finished distributing probes to sleds
background_task = probe_distributor
n_pushed_probes = 0
|
| 1406 | 2026-01-14T21:22:40.797Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = probe_distributor
elapsed = 2.895275151s
iteration = 1
status = {"errors":[],"probes_by_sled":{"b6d65341-167c-41df-9b5c-41cded99c229":0}}
|
| 1407 | 2026-01-14T21:22:40.800Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 72 33 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e r3..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:30469
req_id = df2fdf94-e7c2-4335-92e8-55e091fabbd3
|
| 1408 | 2026-01-14T21:22:40.800Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 29235,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:30469
req_id = df2fdf94-e7c2-4335-92e8-55e091fabbd3
|
| 1409 | 2026-01-14T21:22:40.801Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 1410 | 2026-01-14T21:22:40.801Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:30469
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = df2fdf94-e7c2-4335-92e8-55e091fabbd3
|
| 1411 | 2026-01-14T21:22:40.873Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
|
| 1412 | 2026-01-14T21:22:40.875Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:63174
req_id = 78efcf8c-eb36-478b-81b7-5b7d33f064c7
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
|
| 1413 | 2026-01-14T21:22:40.875Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:63174
req_id = 78efcf8c-eb36-478b-81b7-5b7d33f064c7
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
version = 12.0.0
|
| 1414 | 2026-01-14T21:22:40.887Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 12054
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:63174
req_id = 78efcf8c-eb36-478b-81b7-5b7d33f064c7
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /omicron-config
|
| 1415 | 2026-01-14T21:22:40.887Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
|
| 1416 | 2026-01-14T21:22:40.887Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = tuf_artifact_replication
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1417 | 2026-01-14T21:22:40.887Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1418 | 2026-01-14T21:22:40.887Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1419 | 2026-01-14T21:22:40.889Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1420 | 2026-01-14T21:22:40.980Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
body = None
method = GET
uri = http://[::1]:60096/v2p
|
| 1421 | 2026-01-14T21:22:40.981Z | INFO | test_vpc_firewall (BackgroundTasks): computed internet gateway mappings for sled
assocs = {}
background_task = vpc_route_manager
sled = SimGimlet00
|
| 1422 | 2026-01-14T21:22:40.981Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:60096/eip-gateways
|
| 1423 | 2026-01-14T21:22:40.982Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1424 | 2026-01-14T21:22:40.983Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1425 | 2026-01-14T21:22:40.984Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1426 | 2026-01-14T21:22:40.988Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:51682
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1427 | 2026-01-14T21:22:40.989Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:51058
req_id = 7db12026-7f3a-42b2-9161-06a5158f9e8e
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
| 1428 | 2026-01-14T21:22:40.989Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:51058
req_id = 7db12026-7f3a-42b2-9161-06a5158f9e8e
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
version = 12.0.0
|
| 1429 | 2026-01-14T21:22:40.990Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 912
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:51058
req_id = 7db12026-7f3a-42b2-9161-06a5158f9e8e
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
| 1430 | 2026-01-14T21:22:40.990Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1431 | 2026-01-14T21:22:40.998Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Fleet
result = Ok(())
|
| 1432 | 2026-01-14T21:22:40.998Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
|
| 1433 | 2026-01-14T21:22:40.998Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = tuf_artifact_replication
roles = RoleSet { roles: {} }
|
| 1434 | 2026-01-14T21:22:40.999Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = tuf_artifact_replication
resource = Database
result = Ok(())
|
| 1435 | 2026-01-14T21:22:41.001Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1436 | 2026-01-14T21:22:41.001Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1437 | 2026-01-14T21:22:41.001Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1438 | 2026-01-14T21:22:41.003Z | DEBG | test_vpc_firewall: client response
result = Ok(Response { url: "http://[::1]:60096/omicron-config", status: 204, headers: {"x-request-id": "78efcf8c-eb36-478b-81b7-5b7d33f064c7", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
|
| 1439 | 2026-01-14T21:22:41.004Z | DEBG | test_vpc_firewall: client request
body = Some(Body)
method = PUT
uri = http://[::1]:60096/network-bootstore-config
|
| 1440 | 2026-01-14T21:22:41.004Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:51682
req_id = 249d9287-1e7f-42e1-a84b-27954d48bde7
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
| 1441 | 2026-01-14T21:22:41.005Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:51682
req_id = 249d9287-1e7f-42e1-a84b-27954d48bde7
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
version = 12.0.0
|
| 1442 | 2026-01-14T21:22:41.005Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 87 (0x57) bytes\n0000: c9 21 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c .!..........._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 .......
kind = dns
peer_addr = [::1]:45024
req_id = d5dd8cd5-2d5b-4d31-8621-7a7c4e844e7c
|
| 1443 | 2026-01-14T21:22:41.005Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 51489,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:45024
req_id = d5dd8cd5-2d5b-4d31-8621-7a7c4e844e7c
|
| 1444 | 2026-01-14T21:22:41.005Z | DEBG | test_vpc_firewall (store): query key
key = _clickhouse-admin-keeper._tcp
|
| 1445 | 2026-01-14T21:22:41.006Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 51489,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
24,
95,
99,
108,
105,
99,
107,
104,
111,
117,
115,
101,
45,
97,
100,
109,
105,
110,
45,
107,
101,
101,
112,
101,
114,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} NXDOMAIN: _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
kind = dns
peer_addr = [::1]:45024
req_id = d5dd8cd5-2d5b-4d31-8621-7a7c4e844e7c
|
| 1446 | 2026-01-14T21:22:41.008Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:60096/eip-gateways", status: 204, headers: {"x-request-id": "7db12026-7f3a-42b2-9161-06a5158f9e8e", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
|
| 1447 | 2026-01-14T21:22:41.009Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 3.373412158s
iteration = 1
status = {}
|
| 1448 | 2026-01-14T21:22:41.010Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = vpc_route_manager
iteration = 2
reason = Dependency
|
| 1449 | 2026-01-14T21:22:41.010Z | INFO | test_vpc_firewall (BackgroundTasks): VPC route manager running
background_task = vpc_route_manager
|
| 1450 | 2026-01-14T21:22:41.010Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 1451 | 2026-01-14T21:22:41.010Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1452 | 2026-01-14T21:22:41.010Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1453 | 2026-01-14T21:22:41.010Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1454 | 2026-01-14T21:22:41.010Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1455 | 2026-01-14T21:22:41.013Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 8212
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:51682
req_id = 249d9287-1e7f-42e1-a84b-27954d48bde7
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /v2p
|
| 1456 | 2026-01-14T21:22:41.015Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = tuf_artifact_replication
body = Some(Body)
method = PUT
uri = http://[::1]:60096/artifacts-config
|
| 1457 | 2026-01-14T21:22:41.017Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _cockroach._tcp.control-plane.oxide.internal
|
| 1458 | 2026-01-14T21:22:41.019Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:53965
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1459 | 2026-01-14T21:22:41.019Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:63174
req_id = e76eb346-ec08-4cbe-bd53-5797ac4561cd
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
| 1460 | 2026-01-14T21:22:41.019Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:63174
req_id = e76eb346-ec08-4cbe-bd53-5797ac4561cd
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
version = 12.0.0
|
| 1461 | 2026-01-14T21:22:41.020Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = v2p_manager
result = Ok(Response { url: "http://[::1]:60096/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "249d9287-1e7f-42e1-a84b-27954d48bde7", "content-length": "2", "date": "Wed, 14 Jan 2026 21:22:41 GMT"} })
|
| 1462 | 2026-01-14T21:22:41.021Z | INFO | test_vpc_firewall (BackgroundTasks): found opte v2p mappings
background_task = v2p_manager
interfaces = {}
sled = SimGimlet00
|
| 1463 | 2026-01-14T21:22:41.021Z | INFO | test_vpc_firewall (BackgroundTasks): v2p mappings to delete
background_task = v2p_manager
mappings = []
sled = SimGimlet00
|
| 1464 | 2026-01-14T21:22:41.021Z | INFO | test_vpc_firewall (BackgroundTasks): v2p mappings to add
background_task = v2p_manager
mappings = []
sled = SimGimlet00
|
| 1465 | 2026-01-14T21:22:41.025Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = v2p_manager
elapsed = 3.34150606s
iteration = 1
status = {}
|
| 1466 | 2026-01-14T21:22:41.028Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 8664
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:63174
req_id = e76eb346-ec08-4cbe-bd53-5797ac4561cd
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /network-bootstore-config
|
| 1467 | 2026-01-14T21:22:41.029Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 1468 | 2026-01-14T21:22:41.029Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1469 | 2026-01-14T21:22:41.029Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1470 | 2026-01-14T21:22:41.030Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1471 | 2026-01-14T21:22:41.031Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1472 | 2026-01-14T21:22:41.035Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:53965
req_id = 49a6fb14-289a-4836-8baa-4c8aaccc01c4
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /artifacts-config
|
| 1473 | 2026-01-14T21:22:41.035Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:53965
req_id = 49a6fb14-289a-4836-8baa-4c8aaccc01c4
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /artifacts-config
version = 12.0.0
|
| 1474 | 2026-01-14T21:22:41.046Z | INFO | test_vpc_firewall (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmp3wosp4/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1475 | 2026-01-14T21:22:41.047Z | DEBG | test_vpc_firewall (ArtifactStore): Failed to read ledger: Not found in storage
path = /var/tmp/omicron_tmp/.tmp3wosp4/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1476 | 2026-01-14T21:22:41.047Z | INFO | test_vpc_firewall (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpDRDbDf/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1477 | 2026-01-14T21:22:41.047Z | DEBG | test_vpc_firewall (ArtifactStore): Failed to read ledger: Not found in storage
path = /var/tmp/omicron_tmp/.tmpDRDbDf/artifact-config.json
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1478 | 2026-01-14T21:22:41.047Z | INFO | test_vpc_firewall (ArtifactStore): Writing ledger to /var/tmp/omicron_tmp/.tmp3wosp4/.artifact-config.json.tmp
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1479 | 2026-01-14T21:22:41.047Z | DEBG | test_vpc_firewall: client response
result = Ok(Response { url: "http://[::1]:60096/network-bootstore-config", status: 204, headers: {"x-request-id": "e76eb346-ec08-4cbe-bd53-5797ac4561cd", "date": "Wed, 14 Jan 2026 21:22:41 GMT"} })
|
| 1480 | 2026-01-14T21:22:41.050Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_nexus_external
|
| 1481 | 2026-01-14T21:22:41.050Z | DEBG | test_vpc_firewall: Starting Nexus (external API)
|
| 1482 | 2026-01-14T21:22:43.883Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1483 | 2026-01-14T21:22:43.883Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1484 | 2026-01-14T21:22:43.883Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1485 | 2026-01-14T21:22:43.883Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1486 | 2026-01-14T21:22:43.885Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1487 | 2026-01-14T21:22:43.887Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 73 (0x49) bytes\n0000: 0e 51 01 00 00 01 00 00 00 00 00 01 0a 5f 63 6f .Q..........._co\n0010: 63 6b 72 6f 61 63 68 04 5f 74 63 70 0d 63 6f 6e ckroach._tcp.con\n0020: 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 trol-plane.oxide\n0030: 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 .internal..!....\n0040: 29 04 d0 00 00 00 00 00 00 )........
kind = dns
peer_addr = [::1]:61915
req_id = 4e4cd148-42cd-4cd8-b8c6-e7d9cddfc2e0
|
| 1488 | 2026-01-14T21:22:43.887Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 3665,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_cockroach._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_cockroach._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 10,\n 95,\n 99,\n 111,\n 99,\n 107,\n 114,\n 111,\n 97,\n 99,\n 104,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:61915
req_id = 4e4cd148-42cd-4cd8-b8c6-e7d9cddfc2e0
|
| 1489 | 2026-01-14T21:22:43.888Z | DEBG | test_vpc_firewall (store): query key
key = _cockroach._tcp
|
| 1490 | 2026-01-14T21:22:43.888Z | DEBG | test_vpc_firewall (store): query key
key = 4ca13454-dc8a-4ce2-981d-d389027c56d3.host
|
| 1491 | 2026-01-14T21:22:43.888Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:61915
query = LowerQuery { name: LowerName(Name("_cockroach._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 46432, target: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal") }) }]
req_id = 4e4cd148-42cd-4cd8-b8c6-e7d9cddfc2e0
|
| 1492 | 2026-01-14T21:22:43.889Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1493 | 2026-01-14T21:22:43.889Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1494 | 2026-01-14T21:22:43.889Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1495 | 2026-01-14T21:22:43.890Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1496 | 2026-01-14T21:22:43.891Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1497 | 2026-01-14T21:22:43.911Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1498 | 2026-01-14T21:22:43.911Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
|
| 1499 | 2026-01-14T21:22:43.911Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = vpc_route_manager
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1500 | 2026-01-14T21:22:43.912Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1501 | 2026-01-14T21:22:43.912Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1502 | 2026-01-14T21:22:43.912Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1503 | 2026-01-14T21:22:43.914Z | INFO | test_vpc_firewall (ArtifactStore): Writing ledger to /var/tmp/omicron_tmp/.tmpDRDbDf/.artifact-config.json.tmp
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1504 | 2026-01-14T21:22:43.917Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _cockroach._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 46432, target: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10487, tv_nsec: 304546478 } })
|
| 1505 | 2026-01-14T21:22:43.918Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 1506 | 2026-01-14T21:22:43.919Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 2
reason = Timeout
|
| 1507 | 2026-01-14T21:22:43.919Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 1508 | 2026-01-14T21:22:43.919Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1509 | 2026-01-14T21:22:43.919Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 1510 | 2026-01-14T21:22:43.919Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 1511 | 2026-01-14T21:22:43.920Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 1512 | 2026-01-14T21:22:43.935Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1513 | 2026-01-14T21:22:43.935Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1514 | 2026-01-14T21:22:43.935Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1515 | 2026-01-14T21:22:43.937Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1516 | 2026-01-14T21:22:43.938Z | INFO | test_vpc_firewall (ArtifactStore): Starting delete reconciler
generation = 1
server = b6d65341-167c-41df-9b5c-41cded99c229
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1517 | 2026-01-14T21:22:43.939Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2904380
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:53965
req_id = 49a6fb14-289a-4836-8baa-4c8aaccc01c4
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /artifacts-config
|
| 1518 | 2026-01-14T21:22:43.941Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1519 | 2026-01-14T21:22:43.948Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Fleet
result = Ok(())
|
| 1520 | 2026-01-14T21:22:43.949Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1521 | 2026-01-14T21:22:43.949Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1522 | 2026-01-14T21:22:43.949Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1523 | 2026-01-14T21:22:43.956Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1524 | 2026-01-14T21:22:43.963Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 1525 | 2026-01-14T21:22:43.963Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 1526 | 2026-01-14T21:22:43.963Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 1527 | 2026-01-14T21:22:43.964Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 1528 | 2026-01-14T21:22:43.970Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = tuf_artifact_replication
result = Ok(Response { url: "http://[::1]:60096/artifacts-config", status: 204, headers: {"x-request-id": "49a6fb14-289a-4836-8baa-4c8aaccc01c4", "date": "Wed, 14 Jan 2026 21:22:43 GMT"} })
|
| 1529 | 2026-01-14T21:22:43.970Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = tuf_artifact_replication
body = None
method = GET
uri = http://[::1]:60096/artifacts
|
| 1530 | 2026-01-14T21:22:43.971Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1531 | 2026-01-14T21:22:43.986Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 1532 | 2026-01-14T21:22:43.986Z | TRAC | test_vpc_firewall (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user
background_task = service_firewall_rule_propagation
|
| 1533 | 2026-01-14T21:22:43.986Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1534 | 2026-01-14T21:22:43.986Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1535 | 2026-01-14T21:22:43.987Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1536 | 2026-01-14T21:22:44.133Z | INFO | test_vpc_firewall (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
|
| 1537 | 2026-01-14T21:22:44.133Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = None
method = GET
uri = http://[::1]:60096/vpc-routes
|
| 1538 | 2026-01-14T21:22:44.140Z | DEBG | test_vpc_firewall (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-14T21:22:37.508570Z })
|
| 1539 | 2026-01-14T21:22:44.140Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 221.31649ms
iteration = 2
status = {"config_updated":false}
|
| 1540 | 2026-01-14T21:22:44.144Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1541 | 2026-01-14T21:22:44.148Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1542 | 2026-01-14T21:22:44.149Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1543 | 2026-01-14T21:22:44.149Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1544 | 2026-01-14T21:22:44.151Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1545 | 2026-01-14T21:22:44.154Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:53965
req_id = 7d1e7181-6c5f-4ed5-9772-e5992274eb60
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /artifacts
|
| 1546 | 2026-01-14T21:22:44.154Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:53965
req_id = 7d1e7181-6c5f-4ed5-9772-e5992274eb60
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /artifacts
version = 12.0.0
|
| 1547 | 2026-01-14T21:22:44.157Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:61548
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1548 | 2026-01-14T21:22:44.172Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 0e 05 01 00 00 01 00 00 00 00 00 01 24 34 63 61 ............$4ca\n0010: 31 33 34 35 34 2d 64 63 38 61 2d 34 63 65 32 2d 13454-dc8a-4ce2-\n0020: 39 38 31 64 2d 64 33 38 39 30 32 37 63 35 36 64 981d-d389027c56d\n0030: 33 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 3.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:33784
req_id = d204f317-df68-4283-82bb-c6a52c08cf2b
|
| 1549 | 2026-01-14T21:22:44.172Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 3589,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 52,\n 99,\n 97,\n 49,\n 51,\n 52,\n 53,\n 52,\n 45,\n 100,\n 99,\n 56,\n 97,\n 45,\n 52,\n 99,\n 101,\n 50,\n 45,\n 57,\n 56,\n 49,\n 100,\n 45,\n 100,\n 51,\n 56,\n 57,\n 48,\n 50,\n 55,\n 99,\n 53,\n 54,\n 100,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:33784
req_id = d204f317-df68-4283-82bb-c6a52c08cf2b
|
| 1550 | 2026-01-14T21:22:44.172Z | DEBG | test_vpc_firewall (store): query key
key = 4ca13454-dc8a-4ce2-981d-d389027c56d3.host
|
| 1551 | 2026-01-14T21:22:44.177Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:33784
query = LowerQuery { name: LowerName(Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal.")), original: Query { name: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = d204f317-df68-4283-82bb-c6a52c08cf2b
|
| 1552 | 2026-01-14T21:22:44.206Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 51951
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:53965
req_id = 7d1e7181-6c5f-4ed5-9772-e5992274eb60
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /artifacts
|
| 1553 | 2026-01-14T21:22:44.212Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1554 | 2026-01-14T21:22:44.212Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1555 | 2026-01-14T21:22:44.216Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1556 | 2026-01-14T21:22:44.401Z | DEBG | test_vpc_firewall (CockroachClusterAdminClient): Updated CockroachDB cluster backends
added = 1
addresses = [[::1]:32222]
removed = 0
total = 1
|
| 1557 | 2026-01-14T21:22:44.403Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection
background_task = inventory_collection
|
| 1558 | 2026-01-14T21:22:44.403Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:59250
|
| 1559 | 2026-01-14T21:22:44.403Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/ignition
|
| 1560 | 2026-01-14T21:22:44.405Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:61548
req_id = 241f76fc-0507-4ae4-ab9d-a19fa52e33d8
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
| 1561 | 2026-01-14T21:22:44.405Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:61548
req_id = 241f76fc-0507-4ae4-ab9d-a19fa52e33d8
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
version = 12.0.0
|
| 1562 | 2026-01-14T21:22:44.406Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 86 7f 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:52434
req_id = ad7e1e3e-a5bd-4ed1-b309-c5289faf9388
|
| 1563 | 2026-01-14T21:22:44.406Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 34431,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:52434
req_id = ad7e1e3e-a5bd-4ed1-b309-c5289faf9388
|
| 1564 | 2026-01-14T21:22:44.406Z | DEBG | test_vpc_firewall (store): query key
key = _mgs._tcp
|
| 1565 | 2026-01-14T21:22:44.406Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 1566 | 2026-01-14T21:22:44.406Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:52434
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = ad7e1e3e-a5bd-4ed1-b309-c5289faf9388
|
| 1567 | 2026-01-14T21:22:44.407Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 74 (0x4a) bytes\n0000: 33 c2 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 3............_re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........
kind = dns
peer_addr = [::1]:52945
req_id = 913c5943-4577-4800-8700-c253c56d7e44
|
| 1568 | 2026-01-14T21:22:44.407Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 13250,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:52945
req_id = 913c5943-4577-4800-8700-c253c56d7e44
|
| 1569 | 2026-01-14T21:22:44.407Z | DEBG | test_vpc_firewall (store): query key
key = _repo-depot._tcp
|
| 1570 | 2026-01-14T21:22:44.407Z | DEBG | test_vpc_firewall (store): query key
key = b6d65341-167c-41df-9b5c-41cded99c229.sled
|
| 1571 | 2026-01-14T21:22:44.407Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:52945
query = LowerQuery { name: LowerName(Name("_repo-depot._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_repo-depot._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_repo-depot._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 52160, target: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal") }) }]
req_id = 913c5943-4577-4800-8700-c253c56d7e44
|
| 1572 | 2026-01-14T21:22:44.408Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 79 (0x4f) bytes\n0000: 91 5c 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 .\\..........._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........
kind = dns
peer_addr = [::1]:62782
req_id = 40ebcf14-2be7-4169-b9e7-e9021ba6a3f6
|
| 1573 | 2026-01-14T21:22:44.408Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 37212,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:62782
req_id = 40ebcf14-2be7-4169-b9e7-e9021ba6a3f6
|
| 1574 | 2026-01-14T21:22:44.408Z | DEBG | test_vpc_firewall (store): query key
key = _crucible-pantry._tcp
|
| 1575 | 2026-01-14T21:22:44.408Z | DEBG | test_vpc_firewall (store): query key
key = 077622b5-37ad-4801-a59d-22b17b3a7e04.host
|
| 1576 | 2026-01-14T21:22:44.408Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:62782
query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 60375, target: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal") }) }]
req_id = 40ebcf14-2be7-4169-b9e7-e9021ba6a3f6
|
| 1577 | 2026-01-14T21:22:44.408Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = tuf_artifact_replication
result = Ok(Response { url: "http://[::1]:60096/artifacts", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d1e7181-6c5f-4ed5-9772-e5992274eb60", "content-length": "26", "date": "Wed, 14 Jan 2026 21:22:44 GMT"} })
|
| 1578 | 2026-01-14T21:22:44.409Z | INFO | test_vpc_firewall (BackgroundTasks): Successfully got artifact list
background_task = tuf_artifact_replication
sled = http://[::1]:60096
|
| 1579 | 2026-01-14T21:22:44.410Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 4557
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:61548
req_id = 241f76fc-0507-4ae4-ab9d-a19fa52e33d8
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc-routes
|
| 1580 | 2026-01-14T21:22:44.412Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = tuf_artifact_replication
elapsed = 6.545162158s
iteration = 1
status = {"generation":1,"last_run_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":1,"put_config_err":0,"put_config_ok":1,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":1,"put_config_err":0,"put_config_ok":1,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[{"generation":1,"operation":"put_config","target_sled":"b6d65341-167c-41df-9b5c-41cded99c229","time":"2026-01-14T21:22:43.970127574Z"},{"operation":"list","target_sled":"b6d65341-167c-41df-9b5c-41cded99c229","time":"2026-01-14T21:22:44.409139268Z"}]}
|
| 1581 | 2026-01-14T21:22:44.420Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1582 | 2026-01-14T21:22:44.420Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1583 | 2026-01-14T21:22:44.421Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1584 | 2026-01-14T21:22:44.423Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:60096/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "241f76fc-0507-4ae4-ab9d-a19fa52e33d8", "content-length": "2", "date": "Wed, 14 Jan 2026 21:22:44 GMT"} })
|
| 1585 | 2026-01-14T21:22:44.423Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
|
| 1586 | 2026-01-14T21:22:44.423Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = vpc_route_manager
roles = RoleSet { roles: {} }
|
| 1587 | 2026-01-14T21:22:44.424Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = vpc_route_manager
resource = Database
result = Ok(())
|
| 1588 | 2026-01-14T21:22:44.428Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1589 | 2026-01-14T21:22:44.428Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1590 | 2026-01-14T21:22:44.430Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1591 | 2026-01-14T21:22:44.436Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 58 45 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e XE..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:63715
req_id = 084b6e45-1324-43d5-b535-b695e7a24772
|
| 1592 | 2026-01-14T21:22:44.436Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 22597,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:63715
req_id = 084b6e45-1324-43d5-b535-b695e7a24772
|
| 1593 | 2026-01-14T21:22:44.437Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 1594 | 2026-01-14T21:22:44.437Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:63715
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 084b6e45-1324-43d5-b535-b695e7a24772
|
| 1595 | 2026-01-14T21:22:44.437Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 9c 75 01 00 00 01 00 00 00 00 00 01 24 62 36 64 .u..........$b6d\n0010: 36 35 33 34 31 2d 31 36 37 63 2d 34 31 64 66 2d 65341-167c-41df-\n0020: 39 62 35 63 2d 34 31 63 64 65 64 39 39 63 32 32 9b5c-41cded99c22\n0030: 39 04 73 6c 65 64 0d 63 6f 6e 74 72 6f 6c 2d 70 9.sled.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:62194
req_id = 08798477-1e5a-436c-b151-e9c767313ad6
|
| 1596 | 2026-01-14T21:22:44.437Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 40053,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 115,\n 108,\n 101,\n 100,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:62194
req_id = 08798477-1e5a-436c-b151-e9c767313ad6
|
| 1597 | 2026-01-14T21:22:44.437Z | DEBG | test_vpc_firewall (store): query key
key = b6d65341-167c-41df-9b5c-41cded99c229.sled
|
| 1598 | 2026-01-14T21:22:44.437Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:62194
query = LowerQuery { name: LowerName(Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal.")), original: Query { name: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 08798477-1e5a-436c-b151-e9c767313ad6
|
| 1599 | 2026-01-14T21:22:44.437Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: b1 e7 01 00 00 01 00 00 00 00 00 01 24 30 37 37 ............$077\n0010: 36 32 32 62 35 2d 33 37 61 64 2d 34 38 30 31 2d 622b5-37ad-4801-\n0020: 61 35 39 64 2d 32 32 62 31 37 62 33 61 37 65 30 a59d-22b17b3a7e0\n0030: 34 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 4.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:52647
req_id = cba41c70-bca3-442e-8698-41aa6031cadb
|
| 1600 | 2026-01-14T21:22:44.437Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 45543,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 48,\n 55,\n 55,\n 54,\n 50,\n 50,\n 98,\n 53,\n 45,\n 51,\n 55,\n 97,\n 100,\n 45,\n 52,\n 56,\n 48,\n 49,\n 45,\n 97,\n 53,\n 57,\n 100,\n 45,\n 50,\n 50,\n 98,\n 49,\n 55,\n 98,\n 51,\n 97,\n 55,\n 101,\n 48,\n 52,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:52647
req_id = cba41c70-bca3-442e-8698-41aa6031cadb
|
| 1601 | 2026-01-14T21:22:44.437Z | DEBG | test_vpc_firewall (store): query key
key = 077622b5-37ad-4801-a59d-22b17b3a7e04.host
|
| 1602 | 2026-01-14T21:22:44.437Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:52647
query = LowerQuery { name: LowerName(Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal.")), original: Query { name: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = cba41c70-bca3-442e-8698-41aa6031cadb
|
| 1603 | 2026-01-14T21:22:44.448Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1604 | 2026-01-14T21:22:44.448Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1605 | 2026-01-14T21:22:44.450Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1606 | 2026-01-14T21:22:44.552Z | INFO | test_vpc_firewall (BackgroundTasks): computed internet gateway mappings for sled
assocs = {}
background_task = vpc_route_manager
sled = SimGimlet00
|
| 1607 | 2026-01-14T21:22:44.552Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
body = Some(Body)
method = PUT
uri = http://[::1]:60096/eip-gateways
|
| 1608 | 2026-01-14T21:22:44.552Z | INFO | test_vpc_firewall (InternalApi): set cockroachdb setting
setting = cluster.preserve_downgrade_option
value = 22.1
|
| 1609 | 2026-01-14T21:22:44.552Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1610 | 2026-01-14T21:22:44.553Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1611 | 2026-01-14T21:22:44.554Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1612 | 2026-01-14T21:22:44.555Z | INFO | test_vpc_firewall (dropshot): accepted connection
kind = pantry
local_addr = [::1]:60375
remote_addr = [::1]:45569
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1613 | 2026-01-14T21:22:44.556Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:61548
req_id = 452035b8-a932-4f84-94f5-78fe1280f160
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
| 1614 | 2026-01-14T21:22:44.556Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:61548
req_id = 452035b8-a932-4f84-94f5-78fe1280f160
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
version = 12.0.0
|
| 1615 | 2026-01-14T21:22:44.562Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 6817
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:61548
req_id = 452035b8-a932-4f84-94f5-78fe1280f160
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /eip-gateways
|
| 1616 | 2026-01-14T21:22:44.564Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 1617 | 2026-01-14T21:22:44.564Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1618 | 2026-01-14T21:22:44.564Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1619 | 2026-01-14T21:22:44.564Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1620 | 2026-01-14T21:22:44.565Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1621 | 2026-01-14T21:22:44.569Z | TRAC | test_vpc_firewall (dropshot): incoming request
kind = pantry
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:45569
req_id = a4fbd1e4-c563-4487-a7db-cfce7337df49
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1622 | 2026-01-14T21:22:44.570Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "1cfdb4b1-2f19-4c65-bed5-a5066cfa2193", "content-length": "835", "date": "Wed, 14 Jan 2026 21:22:44 GMT"} })
|
| 1623 | 2026-01-14T21:22:44.571Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0
|
| 1624 | 2026-01-14T21:22:44.571Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
background_task = vpc_route_manager
result = Ok(Response { url: "http://[::1]:60096/eip-gateways", status: 204, headers: {"x-request-id": "452035b8-a932-4f84-94f5-78fe1280f160", "date": "Wed, 14 Jan 2026 21:22:44 GMT"} })
|
| 1625 | 2026-01-14T21:22:44.572Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = vpc_route_manager
elapsed = 3.562945762s
iteration = 2
status = {}
|
| 1626 | 2026-01-14T21:22:44.573Z | INFO | test_vpc_firewall (dropshot): request completed
kind = pantry
latency_us = 3606
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:45569
req_id = a4fbd1e4-c563-4487-a7db-cfce7337df49
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1627 | 2026-01-14T21:22:44.582Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1628 | 2026-01-14T21:22:44.582Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1629 | 2026-01-14T21:22:44.582Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1630 | 2026-01-14T21:22:44.584Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1631 | 2026-01-14T21:22:45.480Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
| 1632 | 2026-01-14T21:22:45.483Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1633 | 2026-01-14T21:22:45.483Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1634 | 2026-01-14T21:22:45.483Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1635 | 2026-01-14T21:22:45.485Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1636 | 2026-01-14T21:22:45.487Z | INFO | test_vpc_firewall (dropshot): accepted connection
kind = pantry
local_addr = [::1]:60375
remote_addr = [::1]:41662
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1637 | 2026-01-14T21:22:45.487Z | INFO | test_vpc_firewall (dropshot): accepted connection
kind = pantry
local_addr = [::1]:60375
remote_addr = [::1]:36760
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1638 | 2026-01-14T21:22:45.487Z | INFO | test_vpc_firewall (dropshot): accepted connection
kind = pantry
local_addr = [::1]:60375
remote_addr = [::1]:56562
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1639 | 2026-01-14T21:22:45.488Z | INFO | test_vpc_firewall (dropshot): accepted connection
kind = pantry
local_addr = [::1]:60375
remote_addr = [::1]:54154
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1640 | 2026-01-14T21:22:45.488Z | INFO | test_vpc_firewall (dropshot): accepted connection
kind = pantry
local_addr = [::1]:60375
remote_addr = [::1]:60714
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1641 | 2026-01-14T21:22:45.488Z | INFO | test_vpc_firewall (dropshot): accepted connection
kind = pantry
local_addr = [::1]:60375
remote_addr = [::1]:55211
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1642 | 2026-01-14T21:22:45.488Z | INFO | test_vpc_firewall (dropshot): accepted connection
kind = pantry
local_addr = [::1]:60375
remote_addr = [::1]:65427
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1643 | 2026-01-14T21:22:45.489Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1644 | 2026-01-14T21:22:45.489Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1645 | 2026-01-14T21:22:45.489Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1646 | 2026-01-14T21:22:45.490Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1647 | 2026-01-14T21:22:45.498Z | TRAC | test_vpc_firewall (dropshot): incoming request
kind = pantry
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:41662
req_id = 388cf598-de3b-4485-87f3-40b06878c8ef
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1648 | 2026-01-14T21:22:45.499Z | TRAC | test_vpc_firewall (dropshot): incoming request
kind = pantry
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:36760
req_id = 566a9198-2b07-4d85-a4b2-1b6c479402e8
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1649 | 2026-01-14T21:22:45.499Z | TRAC | test_vpc_firewall (dropshot): incoming request
kind = pantry
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:56562
req_id = 7975986c-2a89-4496-88d4-ec36a174d9ad
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1650 | 2026-01-14T21:22:45.499Z | TRAC | test_vpc_firewall (dropshot): incoming request
kind = pantry
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:54154
req_id = 0fd0da64-b5c2-43e8-a4f9-124fe75a8e87
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1651 | 2026-01-14T21:22:45.499Z | TRAC | test_vpc_firewall (dropshot): incoming request
kind = pantry
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:60714
req_id = 7ea7d393-30ab-41e2-b944-6f62e8b47250
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1652 | 2026-01-14T21:22:45.499Z | TRAC | test_vpc_firewall (dropshot): incoming request
kind = pantry
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:55211
req_id = 938c9b38-9466-48ae-ba6a-befa61be5c79
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1653 | 2026-01-14T21:22:45.500Z | TRAC | test_vpc_firewall (dropshot): incoming request
kind = pantry
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:65427
req_id = ccb3ead4-1d8a-4b04-a8e8-cebbfebc17fb
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1654 | 2026-01-14T21:22:45.503Z | INFO | test_vpc_firewall (dropshot): request completed
kind = pantry
latency_us = 4610
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:41662
req_id = 388cf598-de3b-4485-87f3-40b06878c8ef
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1655 | 2026-01-14T21:22:45.503Z | INFO | test_vpc_firewall (dropshot): request completed
kind = pantry
latency_us = 4383
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:36760
req_id = 566a9198-2b07-4d85-a4b2-1b6c479402e8
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1656 | 2026-01-14T21:22:45.503Z | INFO | test_vpc_firewall (dropshot): request completed
kind = pantry
latency_us = 4274
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:56562
req_id = 7975986c-2a89-4496-88d4-ec36a174d9ad
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1657 | 2026-01-14T21:22:45.503Z | INFO | test_vpc_firewall (dropshot): request completed
kind = pantry
latency_us = 4160
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:54154
req_id = 0fd0da64-b5c2-43e8-a4f9-124fe75a8e87
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1658 | 2026-01-14T21:22:45.503Z | INFO | test_vpc_firewall (dropshot): request completed
kind = pantry
latency_us = 4087
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:60714
req_id = 7ea7d393-30ab-41e2-b944-6f62e8b47250
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1659 | 2026-01-14T21:22:45.503Z | INFO | test_vpc_firewall (dropshot): request completed
kind = pantry
latency_us = 3979
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:55211
req_id = 938c9b38-9466-48ae-ba6a-befa61be5c79
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1660 | 2026-01-14T21:22:45.504Z | INFO | test_vpc_firewall (dropshot): request completed
kind = pantry
latency_us = 3914
local_addr = [::1]:60375
method = GET
remote_addr = [::1]:65427
req_id = ccb3ead4-1d8a-4b04-a8e8-cebbfebc17fb
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /crucible/pantry/0
|
| 1661 | 2026-01-14T21:22:45.504Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1662 | 2026-01-14T21:22:45.535Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
| 1663 | 2026-01-14T21:22:45.535Z | DEBG | test_vpc_firewall (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some(
V6(
Ipv6Network {
addr: fd00:1122:3344:100::,
prefix: 56,
},
),
)
|
| 1664 | 2026-01-14T21:22:45.535Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1665 | 2026-01-14T21:22:45.535Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1666 | 2026-01-14T21:22:45.536Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1667 | 2026-01-14T21:22:45.540Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1668 | 2026-01-14T21:22:45.565Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 1669 | 2026-01-14T21:22:45.565Z | TRAC | test_vpc_firewall (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
| 1670 | 2026-01-14T21:22:45.565Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 1671 | 2026-01-14T21:22:45.565Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1672 | 2026-01-14T21:22:45.565Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1673 | 2026-01-14T21:22:45.565Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1674 | 2026-01-14T21:22:45.566Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1675 | 2026-01-14T21:22:45.578Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1676 | 2026-01-14T21:22:45.578Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1677 | 2026-01-14T21:22:45.578Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1678 | 2026-01-14T21:22:45.582Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1679 | 2026-01-14T21:22:45.585Z | INFO | test_vpc_firewall (InternalApi): Using static configuration for external switchports
|
| 1680 | 2026-01-14T21:22:45.585Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1681 | 2026-01-14T21:22:45.585Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1682 | 2026-01-14T21:22:45.588Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1683 | 2026-01-14T21:22:45.590Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ce846b15-de3e-483e-8675-13318dfc0db7", "content-length": "734", "date": "Wed, 14 Jan 2026 21:22:45 GMT"} })
|
| 1684 | 2026-01-14T21:22:45.592Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=0
|
| 1685 | 2026-01-14T21:22:45.604Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1686 | 2026-01-14T21:22:45.604Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1687 | 2026-01-14T21:22:45.605Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1688 | 2026-01-14T21:22:45.605Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1689 | 2026-01-14T21:22:45.615Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1690 | 2026-01-14T21:22:45.638Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 1691 | 2026-01-14T21:22:45.638Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1692 | 2026-01-14T21:22:45.638Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1693 | 2026-01-14T21:22:45.639Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1694 | 2026-01-14T21:22:45.650Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1695 | 2026-01-14T21:22:45.651Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1696 | 2026-01-14T21:22:45.657Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1697 | 2026-01-14T21:22:45.675Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1698 | 2026-01-14T21:22:45.675Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1699 | 2026-01-14T21:22:45.676Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1700 | 2026-01-14T21:22:45.687Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1701 | 2026-01-14T21:22:45.687Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1702 | 2026-01-14T21:22:45.689Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1703 | 2026-01-14T21:22:45.705Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1704 | 2026-01-14T21:22:45.709Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1705 | 2026-01-14T21:22:45.710Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1706 | 2026-01-14T21:22:45.716Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1707 | 2026-01-14T21:22:45.717Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1708 | 2026-01-14T21:22:45.718Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1709 | 2026-01-14T21:22:45.723Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 1710 | 2026-01-14T21:22:45.723Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1711 | 2026-01-14T21:22:45.723Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1712 | 2026-01-14T21:22:45.723Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1713 | 2026-01-14T21:22:45.724Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1714 | 2026-01-14T21:22:45.746Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1715 | 2026-01-14T21:22:45.747Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1716 | 2026-01-14T21:22:45.747Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1717 | 2026-01-14T21:22:45.748Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1718 | 2026-01-14T21:22:45.756Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1719 | 2026-01-14T21:22:45.756Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1720 | 2026-01-14T21:22:45.756Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1721 | 2026-01-14T21:22:45.757Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1722 | 2026-01-14T21:22:45.780Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1723 | 2026-01-14T21:22:45.791Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 1724 | 2026-01-14T21:22:45.791Z | TRAC | test_vpc_firewall (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user
background_task = service_firewall_rule_propagation
|
| 1725 | 2026-01-14T21:22:45.791Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 1726 | 2026-01-14T21:22:45.791Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 1727 | 2026-01-14T21:22:45.791Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1728 | 2026-01-14T21:22:45.791Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1729 | 2026-01-14T21:22:45.792Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1730 | 2026-01-14T21:22:45.794Z | INFO | test_vpc_firewall (InternalApi): Recording Rack Network Configuration
|
| 1731 | 2026-01-14T21:22:45.794Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1732 | 2026-01-14T21:22:45.794Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1733 | 2026-01-14T21:22:45.795Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1734 | 2026-01-14T21:22:45.812Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 1735 | 2026-01-14T21:22:45.813Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1736 | 2026-01-14T21:22:45.813Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1737 | 2026-01-14T21:22:45.815Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1738 | 2026-01-14T21:22:45.818Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "18750ca9-410d-487e-9745-96614b124d77", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:45 GMT"} })
|
| 1739 | 2026-01-14T21:22:45.819Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=1
|
| 1740 | 2026-01-14T21:22:45.824Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1741 | 2026-01-14T21:22:45.825Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1742 | 2026-01-14T21:22:45.825Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1743 | 2026-01-14T21:22:45.827Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1744 | 2026-01-14T21:22:45.834Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1745 | 2026-01-14T21:22:45.846Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 1746 | 2026-01-14T21:22:45.847Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1747 | 2026-01-14T21:22:45.847Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1748 | 2026-01-14T21:22:45.847Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1749 | 2026-01-14T21:22:45.882Z | DEBG | test_vpc_firewall (service-firewall-rule-progator): resolved names for firewall rules
background_task = service_firewall_rule_propagation
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
| 1750 | 2026-01-14T21:22:45.893Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Fleet
|
| 1751 | 2026-01-14T21:22:45.893Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = service_firewall_rule_propagation
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1752 | 2026-01-14T21:22:45.893Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1753 | 2026-01-14T21:22:45.893Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1754 | 2026-01-14T21:22:45.893Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1755 | 2026-01-14T21:22:45.915Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1756 | 2026-01-14T21:22:45.932Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Fleet
result = Ok(())
|
| 1757 | 2026-01-14T21:22:45.932Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
|
| 1758 | 2026-01-14T21:22:45.933Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = service_firewall_rule_propagation
roles = RoleSet { roles: {} }
|
| 1759 | 2026-01-14T21:22:45.933Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = service_firewall_rule_propagation
resource = Database
result = Ok(())
|
| 1760 | 2026-01-14T21:22:45.964Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cc4593f4-c34b-4ef1-adc7-afafc3f08db0", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:45 GMT"} })
|
| 1761 | 2026-01-14T21:22:45.977Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=0
|
| 1762 | 2026-01-14T21:22:45.979Z | TRAC | test_vpc_firewall (service-firewall-rule-progator): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-14T19:25:04.038956Z, time_modified: 2026-01-14T19:25:04.038956Z, allowed_ips: None }
background_task = service_firewall_rule_propagation
|
| 1763 | 2026-01-14T21:22:45.979Z | DEBG | test_vpc_firewall (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
background_task = service_firewall_rule_propagation
|
| 1764 | 2026-01-14T21:22:45.979Z | DEBG | test_vpc_firewall (service-firewall-rule-progator): resolved firewall rules for sled agents
background_task = service_firewall_rule_propagation
sled_agent_rules = []
|
| 1765 | 2026-01-14T21:22:45.979Z | DEBG | test_vpc_firewall (service-firewall-rule-progator): resolved 0 rules for sleds
background_task = service_firewall_rule_propagation
|
| 1766 | 2026-01-14T21:22:45.985Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9e7f48c-3a28-457e-b4f0-e82068f38fdd", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:45 GMT"} })
|
| 1767 | 2026-01-14T21:22:45.985Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=1
|
| 1768 | 2026-01-14T21:22:46.008Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5bbec51d-b27d-4ed1-bf3a-672fe1a53d09", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1769 | 2026-01-14T21:22:46.008Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=0
|
| 1770 | 2026-01-14T21:22:46.021Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1771 | 2026-01-14T21:22:46.021Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1772 | 2026-01-14T21:22:46.021Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1773 | 2026-01-14T21:22:46.021Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1774 | 2026-01-14T21:22:46.023Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1775 | 2026-01-14T21:22:46.029Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1776 | 2026-01-14T21:22:46.038Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 1777 | 2026-01-14T21:22:46.038Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1778 | 2026-01-14T21:22:46.039Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1779 | 2026-01-14T21:22:46.040Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1780 | 2026-01-14T21:22:46.069Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1781 | 2026-01-14T21:22:46.069Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1782 | 2026-01-14T21:22:46.069Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1783 | 2026-01-14T21:22:46.069Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1784 | 2026-01-14T21:22:46.070Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1785 | 2026-01-14T21:22:46.091Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e55a845-c6bc-4738-911a-44e2424eccbd", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1786 | 2026-01-14T21:22:46.091Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=1
|
| 1787 | 2026-01-14T21:22:46.118Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1788 | 2026-01-14T21:22:46.132Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1789 | 2026-01-14T21:22:46.132Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1790 | 2026-01-14T21:22:46.132Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1791 | 2026-01-14T21:22:46.133Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1792 | 2026-01-14T21:22:46.149Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: e7fc1aae-3ac4-4e40-8339-6e1cd88cab04, lookup_type: ByName("oxide-service-pool-v6") }
|
| 1793 | 2026-01-14T21:22:46.149Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1794 | 2026-01-14T21:22:46.149Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1795 | 2026-01-14T21:22:46.149Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1796 | 2026-01-14T21:22:46.151Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1797 | 2026-01-14T21:22:46.159Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "80fe2562-231d-4e5d-861a-e15eb57f339e", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1798 | 2026-01-14T21:22:46.159Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/cmpa
|
| 1799 | 2026-01-14T21:22:46.160Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1800 | 2026-01-14T21:22:46.170Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: e7fc1aae-3ac4-4e40-8339-6e1cd88cab04, lookup_type: ByName("oxide-service-pool-v6") }
result = Ok(())
|
| 1801 | 2026-01-14T21:22:46.170Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1802 | 2026-01-14T21:22:46.170Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1803 | 2026-01-14T21:22:46.171Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1804 | 2026-01-14T21:22:46.177Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4cbcaa6e-5c70-4478-b102-519d801e2362", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1805 | 2026-01-14T21:22:46.178Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
|
| 1806 | 2026-01-14T21:22:46.184Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1807 | 2026-01-14T21:22:46.184Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1808 | 2026-01-14T21:22:46.185Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1809 | 2026-01-14T21:22:46.185Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1810 | 2026-01-14T21:22:46.186Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1811 | 2026-01-14T21:22:46.300Z | DEBG | test_vpc_firewall (service-firewall-rule-progator): resolved sleds for vpc oxide-services
background_task = service_firewall_rule_propagation
vpc_to_sled = []
|
| 1812 | 2026-01-14T21:22:46.300Z | DEBG | test_vpc_firewall (service-firewall-rule-progator): sending firewall rules to sled agents
background_task = service_firewall_rule_propagation
|
| 1813 | 2026-01-14T21:22:46.301Z | INFO | test_vpc_firewall (service-firewall-rule-progator): updated firewall rules on 0 sleds
background_task = service_firewall_rule_propagation
|
| 1814 | 2026-01-14T21:22:46.301Z | DEBG | test_vpc_firewall (service-firewall-rule-progator): successfully propagated service firewall rules
background_task = service_firewall_rule_propagation
elapsed = 8.607401948s
|
| 1815 | 2026-01-14T21:22:46.301Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = service_firewall_rule_propagation
elapsed = 8.607484109s
iteration = 1
status = {}
|
| 1816 | 2026-01-14T21:22:46.302Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "86049176-fabe-4705-9dd8-4b67c62d6f2f", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1817 | 2026-01-14T21:22:46.303Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
|
| 1818 | 2026-01-14T21:22:46.305Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "744c586d-3c27-4430-9b79-06371205dc04", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1819 | 2026-01-14T21:22:46.305Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
|
| 1820 | 2026-01-14T21:22:46.307Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "03f59a31-fa77-4498-b319-a8741b02f318", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1821 | 2026-01-14T21:22:46.307Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1
|
| 1822 | 2026-01-14T21:22:46.310Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "90daaac7-617e-4dde-ac0d-dc8ceea369a4", "content-length": "734", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1823 | 2026-01-14T21:22:46.311Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=0
|
| 1824 | 2026-01-14T21:22:46.312Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1825 | 2026-01-14T21:22:46.325Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1826 | 2026-01-14T21:22:46.332Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "26c4447f-a00f-4923-ba70-ec8f43a11d54", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1827 | 2026-01-14T21:22:46.333Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=1
|
| 1828 | 2026-01-14T21:22:46.345Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b0e0e98b-9c71-43cb-96d4-bec98288b854", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1829 | 2026-01-14T21:22:46.346Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=0
|
| 1830 | 2026-01-14T21:22:46.346Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: e7fc1aae-3ac4-4e40-8339-6e1cd88cab04, lookup_type: ByName("oxide-service-pool-v6") }
|
| 1831 | 2026-01-14T21:22:46.346Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1832 | 2026-01-14T21:22:46.346Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1833 | 2026-01-14T21:22:46.346Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1834 | 2026-01-14T21:22:46.346Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1835 | 2026-01-14T21:22:46.353Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1a3f23e3-f1f4-4648-8cdb-0f5c628f67b5", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1836 | 2026-01-14T21:22:46.353Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=1
|
| 1837 | 2026-01-14T21:22:46.357Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fd5a1b47-54eb-43f0-8bbf-c71ac68e8ce3", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1838 | 2026-01-14T21:22:46.357Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=0
|
| 1839 | 2026-01-14T21:22:46.359Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f24046fc-ef42-4cdc-b5c4-76a5f395ae9a", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1840 | 2026-01-14T21:22:46.359Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=1
|
| 1841 | 2026-01-14T21:22:46.362Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c30efa44-8cb4-4057-a886-80ca508920ff", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1842 | 2026-01-14T21:22:46.362Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/cmpa
|
| 1843 | 2026-01-14T21:22:46.368Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1844 | 2026-01-14T21:22:46.374Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: e7fc1aae-3ac4-4e40-8339-6e1cd88cab04, lookup_type: ByName("oxide-service-pool-v6") }
result = Ok(())
|
| 1845 | 2026-01-14T21:22:46.377Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e219a02-c9e4-42ba-8e36-ae8e84ecdd58", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1846 | 2026-01-14T21:22:46.377Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
|
| 1847 | 2026-01-14T21:22:46.378Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d6aada16-7d05-43b4-b3e1-5cac040a533c", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1848 | 2026-01-14T21:22:46.379Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
|
| 1849 | 2026-01-14T21:22:46.381Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "588c4a4e-ea84-49b3-bdc2-3f3f46ea6dc1", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1850 | 2026-01-14T21:22:46.381Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
|
| 1851 | 2026-01-14T21:22:46.382Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "446fa1e2-e51f-48cc-ba84-83c16ba17168", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1852 | 2026-01-14T21:22:46.383Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0
|
| 1853 | 2026-01-14T21:22:46.385Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4e06cfbd-513e-4b7c-bee2-1a49699e426b", "content-length": "723", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1854 | 2026-01-14T21:22:46.385Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/active-slot
|
| 1855 | 2026-01-14T21:22:46.387Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
|
| 1856 | 2026-01-14T21:22:46.387Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1857 | 2026-01-14T21:22:46.387Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1858 | 2026-01-14T21:22:46.387Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1859 | 2026-01-14T21:22:46.388Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1860 | 2026-01-14T21:22:46.390Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "fadf0876-d0e5-4961-a113-ae17a1914a59", "content-length": "10", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1861 | 2026-01-14T21:22:46.390Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/0
|
| 1862 | 2026-01-14T21:22:46.393Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8294fd5d-f2ae-46a7-8a8f-07580fec1d77", "content-length": "144", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1863 | 2026-01-14T21:22:46.417Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/1
|
| 1864 | 2026-01-14T21:22:46.418Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1865 | 2026-01-14T21:22:46.435Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
result = Ok(())
|
| 1866 | 2026-01-14T21:22:46.442Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c7ed00d2-2c7a-42bb-b058-6ecd9b34d7a6", "content-length": "147", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1867 | 2026-01-14T21:22:46.444Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=0
|
| 1868 | 2026-01-14T21:22:46.451Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 1869 | 2026-01-14T21:22:46.451Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1870 | 2026-01-14T21:22:46.451Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1871 | 2026-01-14T21:22:46.451Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1872 | 2026-01-14T21:22:46.452Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1873 | 2026-01-14T21:22:46.459Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1874 | 2026-01-14T21:22:46.469Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 1875 | 2026-01-14T21:22:46.477Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ee2045cb-3c12-4e75-8c24-4506f47ade6f", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1876 | 2026-01-14T21:22:46.477Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=1
|
| 1877 | 2026-01-14T21:22:46.483Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "25462fa0-703f-4757-b0d4-6a38a61e93fd", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1878 | 2026-01-14T21:22:46.483Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=0
|
| 1879 | 2026-01-14T21:22:46.506Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1486c6e5-63de-4311-b9d6-a6452da426be", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1880 | 2026-01-14T21:22:46.507Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=1
|
| 1881 | 2026-01-14T21:22:46.513Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "767ce8ae-86a2-468d-ad27-d556b1aa7c4c", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1882 | 2026-01-14T21:22:46.513Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=0
|
| 1883 | 2026-01-14T21:22:46.518Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2041018c-4263-4764-aa02-38c0a6cffae0", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1884 | 2026-01-14T21:22:46.519Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=1
|
| 1885 | 2026-01-14T21:22:46.523Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b5b509b1-d148-4100-a966-68c555448c95", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1886 | 2026-01-14T21:22:46.523Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/cmpa
|
| 1887 | 2026-01-14T21:22:46.525Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a7cc7289-0d3b-4a26-b40e-62acebd20d59", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1888 | 2026-01-14T21:22:46.525Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
|
| 1889 | 2026-01-14T21:22:46.568Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "aa01bb71-4ac2-42bc-bf58-088740f2913c", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1890 | 2026-01-14T21:22:46.568Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
|
| 1891 | 2026-01-14T21:22:46.570Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e0e3e45-5b7b-44c4-901b-99eaa2c83d42", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1892 | 2026-01-14T21:22:46.570Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
|
| 1893 | 2026-01-14T21:22:46.572Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1584ab13-93d1-4370-ac54-a085d38d8c4f", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1894 | 2026-01-14T21:22:46.572Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1
|
| 1895 | 2026-01-14T21:22:46.574Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "af0d9be7-b308-4fd3-9e87-72642983b675", "content-length": "723", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1896 | 2026-01-14T21:22:46.575Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/active-slot
|
| 1897 | 2026-01-14T21:22:46.576Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "269913b9-5e6f-4e11-b328-23beeaff50fa", "content-length": "10", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1898 | 2026-01-14T21:22:46.576Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/0
|
| 1899 | 2026-01-14T21:22:46.580Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3468c2a0-e143-48b5-b590-549aa8f0d182", "content-length": "144", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1900 | 2026-01-14T21:22:46.581Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/1
|
| 1901 | 2026-01-14T21:22:46.585Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "edb0516e-aa0c-44dd-86a8-9a1782af9e5f", "content-length": "147", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1902 | 2026-01-14T21:22:46.585Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=0
|
| 1903 | 2026-01-14T21:22:46.589Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "65f4736e-2789-4074-8ca2-7941b08a5da8", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1904 | 2026-01-14T21:22:46.589Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=1
|
| 1905 | 2026-01-14T21:22:46.592Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d07f0ad-ebbe-4264-aafe-67d094e53cc6", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1906 | 2026-01-14T21:22:46.592Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=0
|
| 1907 | 2026-01-14T21:22:46.660Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "90534d2a-d5d9-410e-8b04-65591f7a3e0d", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1908 | 2026-01-14T21:22:46.660Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=1
|
| 1909 | 2026-01-14T21:22:46.692Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c21c9d1c-e655-41ff-b32b-10120ab54206", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1910 | 2026-01-14T21:22:46.693Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=0
|
| 1911 | 2026-01-14T21:22:46.695Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "75f146a6-bbf0-47b3-a3f9-32fbac549b1e", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1912 | 2026-01-14T21:22:46.695Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=1
|
| 1913 | 2026-01-14T21:22:46.698Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "26a34c36-efec-4007-890e-bc5d6fb60d07", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1914 | 2026-01-14T21:22:46.698Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/cmpa
|
| 1915 | 2026-01-14T21:22:46.699Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a18bf5e-283e-4b36-909c-0c3c0ced79d1", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1916 | 2026-01-14T21:22:46.699Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
|
| 1917 | 2026-01-14T21:22:46.701Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fbf767b6-a9ff-4409-bf09-c9bd9ac460a7", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1918 | 2026-01-14T21:22:46.701Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
|
| 1919 | 2026-01-14T21:22:46.703Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6e7d76b3-5844-4bea-b59b-dde7bcf78e19", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1920 | 2026-01-14T21:22:46.703Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
|
| 1921 | 2026-01-14T21:22:46.704Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "35ce774c-51eb-4812-8e25-fd1c255238a2", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1922 | 2026-01-14T21:22:46.704Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
|
| 1923 | 2026-01-14T21:22:46.704Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1924 | 2026-01-14T21:22:46.704Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1925 | 2026-01-14T21:22:46.704Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1926 | 2026-01-14T21:22:46.705Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1927 | 2026-01-14T21:22:46.737Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1928 | 2026-01-14T21:22:46.742Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
| 1929 | 2026-01-14T21:22:46.743Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
|
| 1930 | 2026-01-14T21:22:46.743Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1931 | 2026-01-14T21:22:46.743Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1932 | 2026-01-14T21:22:46.743Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1933 | 2026-01-14T21:22:46.743Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1934 | 2026-01-14T21:22:46.752Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1935 | 2026-01-14T21:22:46.758Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
| 1936 | 2026-01-14T21:22:46.758Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1937 | 2026-01-14T21:22:46.758Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1938 | 2026-01-14T21:22:46.759Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1939 | 2026-01-14T21:22:46.876Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from Sled Agent
background_task = inventory_collection
sled_agent_url = http://[::1]:60096
|
| 1940 | 2026-01-14T21:22:46.883Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = http://[::1]:60096
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:60096/inventory
|
| 1941 | 2026-01-14T21:22:46.890Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:49957
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 1942 | 2026-01-14T21:22:46.890Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:49957
req_id = a64d7077-36b0-4cf9-8c92-48da5399b212
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
| 1943 | 2026-01-14T21:22:46.891Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:49957
req_id = a64d7077-36b0-4cf9-8c92-48da5399b212
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
version = 12.0.0
|
| 1944 | 2026-01-14T21:22:46.922Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 35983
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:49957
req_id = a64d7077-36b0-4cf9-8c92-48da5399b212
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
| 1945 | 2026-01-14T21:22:46.927Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = http://[::1]:60096
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:60096/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "a64d7077-36b0-4cf9-8c92-48da5399b212", "content-length": "20208", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
|
| 1946 | 2026-01-14T21:22:46.949Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
| 1947 | 2026-01-14T21:22:46.949Z | DEBG | test_vpc_firewall (BackgroundTasks): end collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
| 1948 | 2026-01-14T21:22:46.949Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from CockroachDB nodes
background_task = inventory_collection
|
| 1949 | 2026-01-14T21:22:46.950Z | DEBG | test_vpc_firewall (CockroachClusterAdminClient): client request
body = None
method = GET
uri = http://[::1]:32222/node/id
|
| 1950 | 2026-01-14T21:22:46.950Z | DEBG | test_vpc_firewall (CockroachClusterAdminClient): client response
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 1951 | 2026-01-14T21:22:46.951Z | WARN | test_vpc_firewall (CockroachClusterAdminClient): Failed to fetch metrics from CockroachDB node
error = Failed to get node ID from [::1]:32222
|
| 1952 | 2026-01-14T21:22:47.131Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from NTP admin (timesync)
background_task = inventory_collection
sled_agent_url = http://[::1]:10123
zone_id = 541d5209-e75f-4f24-a362-01ff39fdfcab (omicron_zone)
|
| 1953 | 2026-01-14T21:22:47.131Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
method = GET
ntp_admin_url = http://[::1]:10123
uri = http://[::1]:10123/timesync
|
| 1954 | 2026-01-14T21:22:47.132Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
ntp_admin_url = http://[::1]:10123
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:10123/timesync", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:10123, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 1955 | 2026-01-14T21:22:47.134Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from internal DNS servers
background_task = inventory_collection
|
| 1956 | 2026-01-14T21:22:47.309Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from DNS server
background_task = inventory_collection
zone_id = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b (omicron_zone)
|
| 1957 | 2026-01-14T21:22:47.309Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
internal_dns_url = http://[::1]:43592
method = GET
uri = http://[::1]:43592/config
|
| 1958 | 2026-01-14T21:22:47.311Z | INFO | test_vpc_firewall (http): accepted connection
kind = dns
local_addr = [::1]:43592
remote_addr = [::1]:36946
|
| 1959 | 2026-01-14T21:22:47.313Z | INFO | test_vpc_firewall (InternalApi): inserted blueprint
blueprint_id = 262c300c-11e4-479f-abb4-29db6faa14be
|
| 1960 | 2026-01-14T21:22:47.313Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
|
| 1961 | 2026-01-14T21:22:47.313Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1962 | 2026-01-14T21:22:47.313Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 1963 | 2026-01-14T21:22:47.313Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 1964 | 2026-01-14T21:22:47.314Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 1965 | 2026-01-14T21:22:47.315Z | TRAC | test_vpc_firewall (http): incoming request
kind = dns
local_addr = [::1]:43592
method = GET
remote_addr = [::1]:36946
req_id = 7d5808ab-928a-4f9d-a2ac-2d10a65cc56c
uri = /config
|
| 1966 | 2026-01-14T21:22:47.315Z | DEBG | test_vpc_firewall (http): determined request API version
kind = dns
local_addr = [::1]:43592
method = GET
remote_addr = [::1]:36946
req_id = 7d5808ab-928a-4f9d-a2ac-2d10a65cc56c
uri = /config
version = 2.0.0
|
| 1967 | 2026-01-14T21:22:47.318Z | INFO | test_vpc_firewall (http): request completed
kind = dns
latency_us = 2258
local_addr = [::1]:43592
method = GET
remote_addr = [::1]:36946
req_id = 7d5808ab-928a-4f9d-a2ac-2d10a65cc56c
response_code = 200
uri = /config
|
| 1968 | 2026-01-14T21:22:47.319Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
internal_dns_url = http://[::1]:43592
result = Ok(Response { url: "http://[::1]:43592/config", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d5808ab-928a-4f9d-a2ac-2d10a65cc56c", "content-length": "3478", "date": "Wed, 14 Jan 2026 21:22:47 GMT"} })
|
| 1969 | 2026-01-14T21:22:47.321Z | DEBG | test_vpc_firewall (BackgroundTasks): finished collection from DNS server
background_task = inventory_collection
zone_id = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b (omicron_zone)
|
| 1970 | 2026-01-14T21:22:47.321Z | DEBG | test_vpc_firewall (BackgroundTasks): finished collection from internal DNS servers
background_task = inventory_collection
|
| 1971 | 2026-01-14T21:22:47.321Z | DEBG | test_vpc_firewall (BackgroundTasks): finished collection
background_task = inventory_collection
|
| 1972 | 2026-01-14T21:22:47.324Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 1973 | 2026-01-14T21:22:47.324Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1974 | 2026-01-14T21:22:47.324Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1975 | 2026-01-14T21:22:47.324Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1976 | 2026-01-14T21:22:47.325Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1977 | 2026-01-14T21:22:47.329Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1978 | 2026-01-14T21:22:47.347Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = BlueprintConfig
result = Ok(())
|
| 1979 | 2026-01-14T21:22:47.348Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 1980 | 2026-01-14T21:22:47.357Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 1981 | 2026-01-14T21:22:47.358Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 1982 | 2026-01-14T21:22:47.358Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 1983 | 2026-01-14T21:22:47.359Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 1984 | 2026-01-14T21:22:47.383Z | INFO | test_vpc_firewall (InternalApi): No networking records needed for crucible_pantry service
|
| 1985 | 2026-01-14T21:22:47.383Z | INFO | test_vpc_firewall (InternalApi): No networking records needed for internal_dns service
|
| 1986 | 2026-01-14T21:22:47.383Z | INFO | test_vpc_firewall (InternalApi): No networking records needed for clickhouse service
|
| 1987 | 2026-01-14T21:22:47.383Z | INFO | test_vpc_firewall (InternalApi): No networking records needed for cockroach_db service
|
| 1988 | 2026-01-14T21:22:47.489Z | INFO | test_vpc_firewall (InternalApi): Inserted networking records for boundary_ntp service
|
| 1989 | 2026-01-14T21:22:47.565Z | INFO | test_vpc_firewall (InternalApi): Inserted networking records for external_dns service
|
| 1990 | 2026-01-14T21:22:47.594Z | INFO | test_vpc_firewall (InternalApi): Inserted networking records for nexus service
|
| 1991 | 2026-01-14T21:22:47.594Z | INFO | test_vpc_firewall (InternalApi): Inserted service networking records
|
| 1992 | 2026-01-14T21:22:47.594Z | INFO | test_vpc_firewall (InternalApi): Inserted physical disks
|
| 1993 | 2026-01-14T21:22:47.594Z | INFO | test_vpc_firewall (InternalApi): Inserted zpools
|
| 1994 | 2026-01-14T21:22:47.594Z | INFO | test_vpc_firewall (InternalApi): Inserted datasets
|
| 1995 | 2026-01-14T21:22:47.622Z | INFO | test_vpc_firewall (InternalApi): Populated DNS tables for internal DNS
|
| 1996 | 2026-01-14T21:22:47.633Z | INFO | test_vpc_firewall (InternalApi): Populated DNS tables for external DNS
|
| 1997 | 2026-01-14T21:22:47.635Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 1998 | 2026-01-14T21:22:47.635Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 1999 | 2026-01-14T21:22:47.635Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2000 | 2026-01-14T21:22:47.635Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2001 | 2026-01-14T21:22:47.636Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2002 | 2026-01-14T21:22:47.656Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2003 | 2026-01-14T21:22:47.660Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = CreateChild
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 2004 | 2026-01-14T21:22:47.660Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 2005 | 2026-01-14T21:22:47.661Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2006 | 2026-01-14T21:22:47.661Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2007 | 2026-01-14T21:22:47.661Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2008 | 2026-01-14T21:22:47.661Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2009 | 2026-01-14T21:22:47.680Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2010 | 2026-01-14T21:22:47.686Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 2011 | 2026-01-14T21:22:47.723Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 2012 | 2026-01-14T21:22:47.723Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2013 | 2026-01-14T21:22:47.723Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2014 | 2026-01-14T21:22:47.723Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2015 | 2026-01-14T21:22:47.724Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2016 | 2026-01-14T21:22:47.740Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2017 | 2026-01-14T21:22:47.750Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 2018 | 2026-01-14T21:22:47.750Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 2019 | 2026-01-14T21:22:47.750Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2020 | 2026-01-14T21:22:47.750Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2021 | 2026-01-14T21:22:47.750Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2022 | 2026-01-14T21:22:47.751Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2023 | 2026-01-14T21:22:47.758Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2024 | 2026-01-14T21:22:47.801Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 2025 | 2026-01-14T21:22:47.810Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
|
| 2026 | 2026-01-14T21:22:47.810Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2027 | 2026-01-14T21:22:47.810Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2028 | 2026-01-14T21:22:47.810Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2029 | 2026-01-14T21:22:47.811Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2030 | 2026-01-14T21:22:47.819Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2031 | 2026-01-14T21:22:47.830Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = DnsConfig
result = Ok(())
|
| 2032 | 2026-01-14T21:22:47.849Z | INFO | test_vpc_firewall (InternalApi): Created recovery silo
|
| 2033 | 2026-01-14T21:22:47.851Z | INFO | test_vpc_firewall (InternalApi): Created recovery user
|
| 2034 | 2026-01-14T21:22:47.860Z | INFO | test_vpc_firewall (InternalApi): Created recovery user's password
|
| 2035 | 2026-01-14T21:22:47.860Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, lookup_type: ById(0fe085d5-9aed-4ef7-a296-b30db2a9c70a) }
|
| 2036 | 2026-01-14T21:22:47.860Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 0fe085d5-9aed-4ef7-a296-b30db2a9c70a
resource_type = Silo
|
| 2037 | 2026-01-14T21:22:47.860Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2038 | 2026-01-14T21:22:47.860Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2039 | 2026-01-14T21:22:47.861Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2040 | 2026-01-14T21:22:47.865Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2041 | 2026-01-14T21:22:47.865Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2042 | 2026-01-14T21:22:47.865Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2043 | 2026-01-14T21:22:47.866Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2044 | 2026-01-14T21:22:47.873Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2045 | 2026-01-14T21:22:47.878Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ModifyPolicy
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, lookup_type: ById(0fe085d5-9aed-4ef7-a296-b30db2a9c70a) }
result = Ok(())
|
| 2046 | 2026-01-14T21:22:47.878Z | DEBG | test_vpc_firewall (InternalApi): Generated role assignment queries
|
| 2047 | 2026-01-14T21:22:47.883Z | INFO | test_vpc_firewall (InternalApi): Granted Silo privileges
|
| 2048 | 2026-01-14T21:22:47.883Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 2049 | 2026-01-14T21:22:47.883Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2050 | 2026-01-14T21:22:47.883Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2051 | 2026-01-14T21:22:47.884Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2052 | 2026-01-14T21:22:47.885Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2053 | 2026-01-14T21:22:47.892Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2054 | 2026-01-14T21:22:47.898Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 2055 | 2026-01-14T21:22:47.919Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2056 | 2026-01-14T21:22:47.919Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2057 | 2026-01-14T21:22:47.921Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2058 | 2026-01-14T21:22:47.928Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2059 | 2026-01-14T21:22:47.928Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2060 | 2026-01-14T21:22:47.929Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2061 | 2026-01-14T21:22:47.934Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2062 | 2026-01-14T21:22:47.934Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2063 | 2026-01-14T21:22:47.935Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2064 | 2026-01-14T21:22:47.939Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2065 | 2026-01-14T21:22:47.939Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2066 | 2026-01-14T21:22:47.939Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2067 | 2026-01-14T21:22:47.939Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2068 | 2026-01-14T21:22:47.940Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2069 | 2026-01-14T21:22:47.955Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2070 | 2026-01-14T21:22:47.955Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2071 | 2026-01-14T21:22:47.955Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2072 | 2026-01-14T21:22:47.956Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2073 | 2026-01-14T21:22:47.961Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2074 | 2026-01-14T21:22:47.961Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2075 | 2026-01-14T21:22:47.961Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2076 | 2026-01-14T21:22:47.972Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2077 | 2026-01-14T21:22:47.984Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2078 | 2026-01-14T21:22:48.003Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2079 | 2026-01-14T21:22:48.003Z | TRAC | test_vpc_firewall (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 2080 | 2026-01-14T21:22:48.003Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2081 | 2026-01-14T21:22:48.003Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2082 | 2026-01-14T21:22:48.003Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2083 | 2026-01-14T21:22:48.003Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2084 | 2026-01-14T21:22:48.004Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2085 | 2026-01-14T21:22:48.009Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2086 | 2026-01-14T21:22:48.009Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2087 | 2026-01-14T21:22:48.009Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2088 | 2026-01-14T21:22:48.010Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2089 | 2026-01-14T21:22:48.018Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2090 | 2026-01-14T21:22:48.018Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2091 | 2026-01-14T21:22:48.018Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2092 | 2026-01-14T21:22:48.019Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2093 | 2026-01-14T21:22:48.025Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2094 | 2026-01-14T21:22:48.038Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2095 | 2026-01-14T21:22:48.038Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2096 | 2026-01-14T21:22:48.038Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2097 | 2026-01-14T21:22:48.038Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2098 | 2026-01-14T21:22:48.045Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2099 | 2026-01-14T21:22:48.045Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2100 | 2026-01-14T21:22:48.047Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2101 | 2026-01-14T21:22:48.066Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2102 | 2026-01-14T21:22:48.067Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2103 | 2026-01-14T21:22:48.068Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2104 | 2026-01-14T21:22:48.073Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2105 | 2026-01-14T21:22:48.073Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2106 | 2026-01-14T21:22:48.074Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2107 | 2026-01-14T21:22:48.081Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2108 | 2026-01-14T21:22:48.081Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2109 | 2026-01-14T21:22:48.081Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2110 | 2026-01-14T21:22:48.081Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2111 | 2026-01-14T21:22:48.082Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2112 | 2026-01-14T21:22:48.088Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2113 | 2026-01-14T21:22:48.088Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2114 | 2026-01-14T21:22:48.088Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2115 | 2026-01-14T21:22:48.091Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2116 | 2026-01-14T21:22:48.097Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2117 | 2026-01-14T21:22:48.097Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2118 | 2026-01-14T21:22:48.097Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2119 | 2026-01-14T21:22:48.099Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2120 | 2026-01-14T21:22:48.105Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2121 | 2026-01-14T21:22:48.118Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2122 | 2026-01-14T21:22:48.118Z | TRAC | test_vpc_firewall (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 2123 | 2026-01-14T21:22:48.118Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2124 | 2026-01-14T21:22:48.118Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2125 | 2026-01-14T21:22:48.118Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2126 | 2026-01-14T21:22:48.125Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2127 | 2026-01-14T21:22:48.125Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2128 | 2026-01-14T21:22:48.126Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2129 | 2026-01-14T21:22:48.131Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2130 | 2026-01-14T21:22:48.132Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2131 | 2026-01-14T21:22:48.133Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2132 | 2026-01-14T21:22:48.138Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2133 | 2026-01-14T21:22:48.138Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2134 | 2026-01-14T21:22:48.139Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2135 | 2026-01-14T21:22:48.145Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 2136 | 2026-01-14T21:22:48.145Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2137 | 2026-01-14T21:22:48.145Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2138 | 2026-01-14T21:22:48.145Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2139 | 2026-01-14T21:22:48.147Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2140 | 2026-01-14T21:22:48.153Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2141 | 2026-01-14T21:22:48.153Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2142 | 2026-01-14T21:22:48.153Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2143 | 2026-01-14T21:22:48.154Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2144 | 2026-01-14T21:22:48.158Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2145 | 2026-01-14T21:22:48.158Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2146 | 2026-01-14T21:22:48.159Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2147 | 2026-01-14T21:22:48.160Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2148 | 2026-01-14T21:22:48.166Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2149 | 2026-01-14T21:22:48.179Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2150 | 2026-01-14T21:22:48.179Z | TRAC | test_vpc_firewall (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 2151 | 2026-01-14T21:22:48.179Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 2152 | 2026-01-14T21:22:48.179Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2153 | 2026-01-14T21:22:48.179Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2154 | 2026-01-14T21:22:48.179Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2155 | 2026-01-14T21:22:48.181Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2156 | 2026-01-14T21:22:48.186Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2157 | 2026-01-14T21:22:48.186Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2158 | 2026-01-14T21:22:48.186Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2159 | 2026-01-14T21:22:48.187Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2160 | 2026-01-14T21:22:48.193Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2161 | 2026-01-14T21:22:48.194Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2162 | 2026-01-14T21:22:48.194Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2163 | 2026-01-14T21:22:48.194Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2164 | 2026-01-14T21:22:48.198Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2165 | 2026-01-14T21:22:48.215Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2166 | 2026-01-14T21:22:48.215Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2167 | 2026-01-14T21:22:48.215Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2168 | 2026-01-14T21:22:48.216Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2169 | 2026-01-14T21:22:48.226Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2170 | 2026-01-14T21:22:48.226Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2171 | 2026-01-14T21:22:48.227Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2172 | 2026-01-14T21:22:48.231Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2173 | 2026-01-14T21:22:48.231Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2174 | 2026-01-14T21:22:48.232Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2175 | 2026-01-14T21:22:48.236Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2176 | 2026-01-14T21:22:48.237Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2177 | 2026-01-14T21:22:48.256Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2178 | 2026-01-14T21:22:48.263Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2179 | 2026-01-14T21:22:48.263Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2180 | 2026-01-14T21:22:48.264Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2181 | 2026-01-14T21:22:48.270Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 2182 | 2026-01-14T21:22:48.270Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2183 | 2026-01-14T21:22:48.270Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2184 | 2026-01-14T21:22:48.270Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2185 | 2026-01-14T21:22:48.271Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2186 | 2026-01-14T21:22:48.277Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2187 | 2026-01-14T21:22:48.278Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2188 | 2026-01-14T21:22:48.278Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2189 | 2026-01-14T21:22:48.279Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2190 | 2026-01-14T21:22:48.298Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2191 | 2026-01-14T21:22:48.299Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2192 | 2026-01-14T21:22:48.299Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2193 | 2026-01-14T21:22:48.301Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2194 | 2026-01-14T21:22:48.306Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2195 | 2026-01-14T21:22:48.325Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 2196 | 2026-01-14T21:22:48.325Z | TRAC | test_vpc_firewall (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 2197 | 2026-01-14T21:22:48.325Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 2198 | 2026-01-14T21:22:48.325Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2199 | 2026-01-14T21:22:48.326Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2200 | 2026-01-14T21:22:48.326Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2201 | 2026-01-14T21:22:48.327Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2202 | 2026-01-14T21:22:48.350Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2203 | 2026-01-14T21:22:48.350Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2204 | 2026-01-14T21:22:48.350Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2205 | 2026-01-14T21:22:48.351Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2206 | 2026-01-14T21:22:48.354Z | INFO | test_vpc_firewall (BackgroundTasks): inserted inventory collection
background_task = inventory_collection
collection_id = 0d2e7770-becb-406e-bb80-957852840966
|
| 2207 | 2026-01-14T21:22:48.354Z | DEBG | test_vpc_firewall (BackgroundTasks): inventory collection complete
background_task = inventory_collection
collection_id = 0d2e7770-becb-406e-bb80-957852840966
time_started = 2026-01-14 21:22:44.402172 UTC
|
| 2208 | 2026-01-14T21:22:48.354Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 8.211939701s
iteration = 2
status = {"collection_id":"0d2e7770-becb-406e-bb80-957852840966","time_done":"2026-01-14 21:22:47.321978 UTC","time_started":"2026-01-14 21:22:44.402172 UTC"}
|
| 2209 | 2026-01-14T21:22:48.354Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = inventory_loader
iteration = 2
reason = Dependency
|
| 2210 | 2026-01-14T21:22:48.354Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
|
| 2211 | 2026-01-14T21:22:48.355Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2212 | 2026-01-14T21:22:48.355Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 2213 | 2026-01-14T21:22:48.355Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 2214 | 2026-01-14T21:22:48.356Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 2215 | 2026-01-14T21:22:48.357Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 2
reason = Dependency
|
| 2216 | 2026-01-14T21:22:48.357Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 2217 | 2026-01-14T21:22:48.357Z | TRAC | test_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 2218 | 2026-01-14T21:22:48.357Z | INFO | test_vpc_firewall (BackgroundTasks): invalidating multicast caches due to topology change
background_task = multicast_reconciler
|
| 2219 | 2026-01-14T21:22:48.357Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 2220 | 2026-01-14T21:22:48.359Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: dd c4 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:22258
req_id = 8134f77c-2e78-4177-986b-3478cf463d43
|
| 2221 | 2026-01-14T21:22:48.361Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 56772,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:22258
req_id = 8134f77c-2e78-4177-986b-3478cf463d43
|
| 2222 | 2026-01-14T21:22:48.361Z | DEBG | test_vpc_firewall (store): query key
key = _dendrite._tcp
|
| 2223 | 2026-01-14T21:22:48.362Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 2224 | 2026-01-14T21:22:48.362Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:22258
query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 8134f77c-2e78-4177-986b-3478cf463d43
|
| 2225 | 2026-01-14T21:22:48.371Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10491, tv_nsec: 757918403 } })
|
| 2226 | 2026-01-14T21:22:48.371Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2227 | 2026-01-14T21:22:48.375Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2228 | 2026-01-14T21:22:48.388Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
result = Ok(())
|
| 2229 | 2026-01-14T21:22:48.388Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 2230 | 2026-01-14T21:22:48.388Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 2231 | 2026-01-14T21:22:48.389Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 2232 | 2026-01-14T21:22:48.390Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2233 | 2026-01-14T21:22:48.390Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2234 | 2026-01-14T21:22:48.390Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2235 | 2026-01-14T21:22:48.391Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2236 | 2026-01-14T21:22:48.395Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: bf e6 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:16202
req_id = c78a9a26-a2a8-45a0-848f-fa18ccce8380
|
| 2237 | 2026-01-14T21:22:48.396Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 49126,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:16202
req_id = c78a9a26-a2a8-45a0-848f-fa18ccce8380
|
| 2238 | 2026-01-14T21:22:48.397Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 2239 | 2026-01-14T21:22:48.398Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:16202
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = c78a9a26-a2a8-45a0-848f-fa18ccce8380
|
| 2240 | 2026-01-14T21:22:48.398Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 2241 | 2026-01-14T21:22:48.398Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 2242 | 2026-01-14T21:22:48.399Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 2243 | 2026-01-14T21:22:48.471Z | TRAC | test_vpc_firewall (DpdClient): client request
background_task = multicast_reconciler
body = None
method = GET
uri = http://[::1]:65194/switch/identifiers
|
| 2244 | 2026-01-14T21:22:48.472Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2245 | 2026-01-14T21:22:48.489Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 2246 | 2026-01-14T21:22:48.489Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2247 | 2026-01-14T21:22:48.489Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2248 | 2026-01-14T21:22:48.492Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2249 | 2026-01-14T21:22:48.494Z | TRAC | test_vpc_firewall (DpdClient): client response
background_task = multicast_reconciler
result = Ok(Response { url: "http://[::1]:65194/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "6dc2fe37-fcb8-4bb1-b261-52a7587b16dc", "content-length": "206", "date": "Wed, 14 Jan 2026 21:22:48 GMT"} })
|
| 2250 | 2026-01-14T21:22:48.494Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Creating
|
| 2251 | 2026-01-14T21:22:48.497Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2252 | 2026-01-14T21:22:48.497Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2253 | 2026-01-14T21:22:48.498Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2254 | 2026-01-14T21:22:48.541Z | DEBG | test_vpc_firewall (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("nexus"): [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], Name("external-dns"): [NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }]}
subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]}
vpc_interfaces = {}
|
| 2255 | 2026-01-14T21:22:48.541Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 2256 | 2026-01-14T21:22:48.541Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2257 | 2026-01-14T21:22:48.541Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2258 | 2026-01-14T21:22:48.541Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2259 | 2026-01-14T21:22:48.542Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2260 | 2026-01-14T21:22:48.551Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2261 | 2026-01-14T21:22:48.564Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 2262 | 2026-01-14T21:22:48.564Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2263 | 2026-01-14T21:22:48.564Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2264 | 2026-01-14T21:22:48.566Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2265 | 2026-01-14T21:22:48.571Z | TRAC | test_vpc_firewall (nexus): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-14T19:25:04.038956Z, time_modified: 2026-01-14T21:22:47.898693Z, allowed_ips: None }
|
| 2266 | 2026-01-14T21:22:48.572Z | DEBG | test_vpc_firewall (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
| 2267 | 2026-01-14T21:22:48.572Z | DEBG | test_vpc_firewall (nexus): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
|
| 2268 | 2026-01-14T21:22:48.572Z | DEBG | test_vpc_firewall (nexus): resolved 3 rules for sleds
|
| 2269 | 2026-01-14T21:22:48.618Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Creating
|
| 2270 | 2026-01-14T21:22:48.619Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Deleting
|
| 2271 | 2026-01-14T21:22:48.619Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2272 | 2026-01-14T21:22:48.619Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2273 | 2026-01-14T21:22:48.620Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2274 | 2026-01-14T21:22:48.716Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Deleting
|
| 2275 | 2026-01-14T21:22:48.716Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Active
|
| 2276 | 2026-01-14T21:22:48.716Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2277 | 2026-01-14T21:22:48.716Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2278 | 2026-01-14T21:22:48.717Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2279 | 2026-01-14T21:22:48.722Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Active
|
| 2280 | 2026-01-14T21:22:48.722Z | TRAC | test_vpc_firewall (BackgroundTasks): reconciling member state changes
background_task = multicast_reconciler
|
| 2281 | 2026-01-14T21:22:48.722Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2282 | 2026-01-14T21:22:48.722Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2283 | 2026-01-14T21:22:48.724Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2284 | 2026-01-14T21:22:48.734Z | DEBG | test_vpc_firewall (nexus): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-01-14T21:22:38.887398Z, time_modified: 2026-01-14T21:22:38.887398Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(60096), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(52160), cpu_family: AmdMilan }]
|
| 2285 | 2026-01-14T21:22:48.734Z | DEBG | test_vpc_firewall (nexus): sending firewall rules to sled agents
|
| 2286 | 2026-01-14T21:22:48.796Z | TRAC | test_vpc_firewall (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Database
|
| 2287 | 2026-01-14T21:22:48.796Z | DEBG | test_vpc_firewall (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
| 2288 | 2026-01-14T21:22:48.798Z | DEBG | test_vpc_firewall (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2289 | 2026-01-14T21:22:48.801Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2290 | 2026-01-14T21:22:48.801Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2291 | 2026-01-14T21:22:48.802Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2292 | 2026-01-14T21:22:48.809Z | TRAC | test_vpc_firewall (InstanceAllocator): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
| 2293 | 2026-01-14T21:22:48.809Z | TRAC | test_vpc_firewall (InstanceAllocator): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2294 | 2026-01-14T21:22:48.809Z | TRAC | test_vpc_firewall (InstanceAllocator): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Database
|
| 2295 | 2026-01-14T21:22:48.809Z | DEBG | test_vpc_firewall (InstanceAllocator): roles
roles = RoleSet { roles: {} }
|
| 2296 | 2026-01-14T21:22:48.810Z | DEBG | test_vpc_firewall (InstanceAllocator): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2297 | 2026-01-14T21:22:48.815Z | DEBG | test_vpc_firewall (InstanceAllocator): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
|
| 2298 | 2026-01-14T21:22:48.822Z | DEBG | test_vpc_firewall (InstanceAllocator): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
| 2299 | 2026-01-14T21:22:48.823Z | DEBG | test_vpc_firewall (nexus): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:60096/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2300 | 2026-01-14T21:22:48.824Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:64288
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 2301 | 2026-01-14T21:22:48.825Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:64288
req_id = f2eb860c-c6c3-499b-abd4-859f9ca37e39
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2302 | 2026-01-14T21:22:48.825Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:64288
req_id = f2eb860c-c6c3-499b-abd4-859f9ca37e39
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
version = 12.0.0
|
| 2303 | 2026-01-14T21:22:48.827Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2441
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:64288
req_id = f2eb860c-c6c3-499b-abd4-859f9ca37e39
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 2304 | 2026-01-14T21:22:48.828Z | DEBG | test_vpc_firewall (nexus): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:60096/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "f2eb860c-c6c3-499b-abd4-859f9ca37e39", "date": "Wed, 14 Jan 2026 21:22:48 GMT"} })
|
| 2305 | 2026-01-14T21:22:48.837Z | INFO | test_vpc_firewall (nexus): updated firewall rules on 1 sleds
|
| 2306 | 2026-01-14T21:22:48.837Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_config_internal
dns_group = internal
iteration = 2
reason = Signaled
|
| 2307 | 2026-01-14T21:22:48.837Z | DEBG | test_vpc_firewall (BackgroundTasks): reading DNS version
background_task = dns_config_internal
dns_group = internal
|
| 2308 | 2026-01-14T21:22:48.838Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2309 | 2026-01-14T21:22:48.838Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2310 | 2026-01-14T21:22:48.838Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2311 | 2026-01-14T21:22:48.839Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_servers_internal
dns_group = internal
iteration = 2
reason = Signaled
|
| 2312 | 2026-01-14T21:22:48.839Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
|
| 2313 | 2026-01-14T21:22:48.840Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_config_external
dns_group = external
iteration = 2
reason = Signaled
|
| 2314 | 2026-01-14T21:22:48.840Z | DEBG | test_vpc_firewall (BackgroundTasks): reading DNS version
background_task = dns_config_external
dns_group = external
|
| 2315 | 2026-01-14T21:22:48.840Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2316 | 2026-01-14T21:22:48.840Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2317 | 2026-01-14T21:22:48.840Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2318 | 2026-01-14T21:22:48.841Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_servers_external
dns_group = external
iteration = 2
reason = Signaled
|
| 2319 | 2026-01-14T21:22:48.841Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
|
| 2320 | 2026-01-14T21:22:48.841Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = external_endpoints
iteration = 2
reason = Signaled
|
| 2321 | 2026-01-14T21:22:48.841Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 2322 | 2026-01-14T21:22:48.841Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2323 | 2026-01-14T21:22:48.841Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2324 | 2026-01-14T21:22:48.842Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2325 | 2026-01-14T21:22:48.842Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2326 | 2026-01-14T21:22:48.843Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = inventory_collection
iteration = 3
reason = Signaled
|
| 2327 | 2026-01-14T21:22:48.843Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 2328 | 2026-01-14T21:22:48.843Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2329 | 2026-01-14T21:22:48.843Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2330 | 2026-01-14T21:22:48.843Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2331 | 2026-01-14T21:22:48.843Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2332 | 2026-01-14T21:22:48.844Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_loader
iteration = 2
reason = Signaled
|
| 2333 | 2026-01-14T21:22:48.844Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
|
| 2334 | 2026-01-14T21:22:48.844Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2335 | 2026-01-14T21:22:48.844Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 2336 | 2026-01-14T21:22:48.844Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 2337 | 2026-01-14T21:22:48.845Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 2338 | 2026-01-14T21:22:48.847Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 75 (0x4b) bytes\n0000: 06 55 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 .U..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........
kind = dns
peer_addr = [::1]:11870
req_id = b98fee7c-a72f-4396-a51c-1a0ee543e8f0
|
| 2339 | 2026-01-14T21:22:48.847Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 1621,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:11870
req_id = b98fee7c-a72f-4396-a51c-1a0ee543e8f0
|
| 2340 | 2026-01-14T21:22:48.848Z | DEBG | test_vpc_firewall (store): query key
key = _nameservice._tcp
|
| 2341 | 2026-01-14T21:22:48.848Z | DEBG | test_vpc_firewall (store): query key
key = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host
|
| 2342 | 2026-01-14T21:22:48.848Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:11870
query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 43592, target: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal") }) }]
req_id = b98fee7c-a72f-4396-a51c-1a0ee543e8f0
|
| 2343 | 2026-01-14T21:22:48.848Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 76 (0x4c) bytes\n0000: 9c c1 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:47270
req_id = e6297e02-9460-44a8-ae71-0dd4f3f76931
|
| 2344 | 2026-01-14T21:22:48.848Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 40129,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:47270
req_id = e6297e02-9460-44a8-ae71-0dd4f3f76931
|
| 2345 | 2026-01-14T21:22:48.848Z | DEBG | test_vpc_firewall (store): query key
key = _external-dns._tcp
|
| 2346 | 2026-01-14T21:22:48.848Z | DEBG | test_vpc_firewall (store): query key
key = 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host
|
| 2347 | 2026-01-14T21:22:48.848Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:47270
query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 41277, target: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal") }) }]
req_id = e6297e02-9460-44a8-ae71-0dd4f3f76931
|
| 2348 | 2026-01-14T21:22:48.850Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _nameservice._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 43592, target: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 236218781 } })
|
| 2349 | 2026-01-14T21:22:48.850Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2350 | 2026-01-14T21:22:48.850Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _external-dns._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 41277, target: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 237393783 } })
|
| 2351 | 2026-01-14T21:22:48.850Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2352 | 2026-01-14T21:22:48.851Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 7e 52 01 00 00 01 00 00 00 00 00 01 24 30 64 30 ~R..........$0d0\n0010: 34 61 66 30 63 2d 35 63 31 30 2d 34 62 62 38 2d 4af0c-5c10-4bb8-\n0020: 61 31 66 34 2d 36 38 63 37 31 61 66 63 31 62 38 a1f4-68c71afc1b8\n0030: 62 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 b.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:12656
req_id = 21b55b95-a0e2-4bb4-b715-b797ccd57f22
|
| 2353 | 2026-01-14T21:22:48.851Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 32338,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 48,\n 100,\n 48,\n 52,\n 97,\n 102,\n 48,\n 99,\n 45,\n 53,\n 99,\n 49,\n 48,\n 45,\n 52,\n 98,\n 98,\n 56,\n 45,\n 97,\n 49,\n 102,\n 52,\n 45,\n 54,\n 56,\n 99,\n 55,\n 49,\n 97,\n 102,\n 99,\n 49,\n 98,\n 56,\n 98,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:12656
req_id = 21b55b95-a0e2-4bb4-b715-b797ccd57f22
|
| 2354 | 2026-01-14T21:22:48.851Z | DEBG | test_vpc_firewall (store): query key
key = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host
|
| 2355 | 2026-01-14T21:22:48.851Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:12656
query = LowerQuery { name: LowerName(Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal.")), original: Query { name: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 21b55b95-a0e2-4bb4-b715-b797ccd57f22
|
| 2356 | 2026-01-14T21:22:48.851Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: a3 2f 01 00 00 01 00 00 00 00 00 01 24 36 65 31 ./..........$6e1\n0010: 65 63 36 63 30 2d 34 39 32 31 2d 34 62 37 34 2d ec6c0-4921-4b74-\n0020: 62 38 65 66 2d 64 36 34 62 32 62 38 62 38 37 62 b8ef-d64b2b8b87b\n0030: 39 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 9.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:16558
req_id = d40169b5-add9-4919-84d6-bbd2c8f77e2b
|
| 2357 | 2026-01-14T21:22:48.851Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 41775,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 54,\n 101,\n 49,\n 101,\n 99,\n 54,\n 99,\n 48,\n 45,\n 52,\n 57,\n 50,\n 49,\n 45,\n 52,\n 98,\n 55,\n 52,\n 45,\n 98,\n 56,\n 101,\n 102,\n 45,\n 100,\n 54,\n 52,\n 98,\n 50,\n 98,\n 56,\n 98,\n 56,\n 55,\n 98,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:16558
req_id = d40169b5-add9-4919-84d6-bbd2c8f77e2b
|
| 2358 | 2026-01-14T21:22:48.851Z | DEBG | test_vpc_firewall (store): query key
key = 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host
|
| 2359 | 2026-01-14T21:22:48.851Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:16558
query = LowerQuery { name: LowerName(Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal.")), original: Query { name: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = d40169b5-add9-4919-84d6-bbd2c8f77e2b
|
| 2360 | 2026-01-14T21:22:48.852Z | INFO | test_vpc_firewall (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:43592] }
background_task = dns_servers_internal
dns_group = internal
|
| 2361 | 2026-01-14T21:22:48.852Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_servers_internal
dns_group = internal
elapsed = 12.571576ms
iteration = 2
status = {"addresses":["[::1]:43592"]}
|
| 2362 | 2026-01-14T21:22:48.852Z | INFO | test_vpc_firewall (BackgroundTasks): found DNS servers (initial)
addresses = DnsServersList { addresses: [[::1]:41277] }
background_task = dns_servers_external
dns_group = external
|
| 2363 | 2026-01-14T21:22:48.852Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_servers_external
dns_group = external
elapsed = 10.985936ms
iteration = 2
status = {"addresses":["[::1]:41277"]}
|
| 2364 | 2026-01-14T21:22:48.852Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 2
reason = Dependency
|
| 2365 | 2026-01-14T21:22:48.852Z | WARN | test_vpc_firewall (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_internal
dns_group = internal
reason = no config
|
| 2366 | 2026-01-14T21:22:48.852Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 29.548\u{b5}s
iteration = 2
status = {"error":"no config"}
|
| 2367 | 2026-01-14T21:22:48.852Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 2
reason = Dependency
|
| 2368 | 2026-01-14T21:22:48.852Z | WARN | test_vpc_firewall (BackgroundTasks): DNS propagation: skipped
background_task = dns_propagation_external
dns_group = external
reason = no config
|
| 2369 | 2026-01-14T21:22:48.852Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 11.984\u{b5}s
iteration = 2
status = {"error":"no config"}
|
| 2370 | 2026-01-14T21:22:48.857Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2371 | 2026-01-14T21:22:48.866Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 2372 | 2026-01-14T21:22:48.866Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2373 | 2026-01-14T21:22:48.866Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2374 | 2026-01-14T21:22:48.866Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2375 | 2026-01-14T21:22:48.867Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 2376 | 2026-01-14T21:22:48.868Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2377 | 2026-01-14T21:22:48.868Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2378 | 2026-01-14T21:22:48.868Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2379 | 2026-01-14T21:22:48.869Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2380 | 2026-01-14T21:22:48.870Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 2381 | 2026-01-14T21:22:48.870Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2382 | 2026-01-14T21:22:48.870Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2383 | 2026-01-14T21:22:48.870Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2384 | 2026-01-14T21:22:48.870Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2385 | 2026-01-14T21:22:48.875Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2386 | 2026-01-14T21:22:48.881Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 2387 | 2026-01-14T21:22:48.881Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2388 | 2026-01-14T21:22:48.881Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2389 | 2026-01-14T21:22:48.884Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2390 | 2026-01-14T21:22:48.888Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2391 | 2026-01-14T21:22:48.896Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = BlueprintConfig
result = Ok(())
|
| 2392 | 2026-01-14T21:22:48.896Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 2393 | 2026-01-14T21:22:48.896Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 2394 | 2026-01-14T21:22:48.896Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 2395 | 2026-01-14T21:22:48.899Z | DEBG | test_vpc_firewall (BackgroundTasks): found groups for member reconciliation
background_task = multicast_reconciler
total_groups = 0
|
| 2396 | 2026-01-14T21:22:48.900Z | DEBG | test_vpc_firewall (BackgroundTasks): member state reconciliation completed
background_task = multicast_reconciler
members_processed = 0
|
| 2397 | 2026-01-14T21:22:48.900Z | TRAC | test_vpc_firewall (BackgroundTasks): cleaning up deleted multicast members
background_task = multicast_reconciler
|
| 2398 | 2026-01-14T21:22:48.900Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2399 | 2026-01-14T21:22:48.900Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2400 | 2026-01-14T21:22:48.901Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2401 | 2026-01-14T21:22:48.902Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2402 | 2026-01-14T21:22:48.914Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 2403 | 2026-01-14T21:22:48.915Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2404 | 2026-01-14T21:22:48.937Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 2405 | 2026-01-14T21:22:48.943Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
|
| 2406 | 2026-01-14T21:22:48.944Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2407 | 2026-01-14T21:22:48.944Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2408 | 2026-01-14T21:22:48.945Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2409 | 2026-01-14T21:22:48.948Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2410 | 2026-01-14T21:22:48.977Z | DEBG | test_vpc_firewall (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few)
background_task = inventory_collection
candidates = [(0d2e7770-becb-406e-bb80-957852840966, 2)]
|
| 2411 | 2026-01-14T21:22:48.977Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
|
| 2412 | 2026-01-14T21:22:48.988Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Blueprint { parent: Fleet, key: 262c300c-11e4-479f-abb4-29db6faa14be, lookup_type: ById(262c300c-11e4-479f-abb4-29db6faa14be) }
|
| 2413 | 2026-01-14T21:22:48.988Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2414 | 2026-01-14T21:22:48.988Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 2415 | 2026-01-14T21:22:48.988Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 2416 | 2026-01-14T21:22:48.989Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 2417 | 2026-01-14T21:22:48.991Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 3
reason = Timeout
|
| 2418 | 2026-01-14T21:22:48.991Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 2419 | 2026-01-14T21:22:48.991Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2420 | 2026-01-14T21:22:48.991Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 2421 | 2026-01-14T21:22:48.991Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 2422 | 2026-01-14T21:22:48.992Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 2423 | 2026-01-14T21:22:48.994Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 67 (0x43) bytes\n0000: 77 4f 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 wO..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ...
kind = dns
peer_addr = [::1]:15865
req_id = 03b62dee-6b77-4e52-a137-2e115d2816bf
|
| 2424 | 2026-01-14T21:22:48.994Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 30543,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:15865
req_id = 03b62dee-6b77-4e52-a137-2e115d2816bf
|
| 2425 | 2026-01-14T21:22:48.994Z | DEBG | test_vpc_firewall (store): query key
key = _mgs._tcp
|
| 2426 | 2026-01-14T21:22:48.994Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 2427 | 2026-01-14T21:22:48.995Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:15865
query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 03b62dee-6b77-4e52-a137-2e115d2816bf
|
| 2428 | 2026-01-14T21:22:48.995Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _mgs._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 382538438 } })
|
| 2429 | 2026-01-14T21:22:48.996Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2430 | 2026-01-14T21:22:48.997Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 30 94 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e 0...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:59419
req_id = ac1ee11b-b788-491c-b137-8d046025db20
|
| 2431 | 2026-01-14T21:22:48.997Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 12436,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:59419
req_id = ac1ee11b-b788-491c-b137-8d046025db20
|
| 2432 | 2026-01-14T21:22:48.997Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 2433 | 2026-01-14T21:22:48.997Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:59419
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = ac1ee11b-b788-491c-b137-8d046025db20
|
| 2434 | 2026-01-14T21:22:49.096Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
|
| 2435 | 2026-01-14T21:22:49.097Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2436 | 2026-01-14T21:22:49.109Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = DnsConfig
result = Ok(())
|
| 2437 | 2026-01-14T21:22:49.110Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2438 | 2026-01-14T21:22:49.110Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2439 | 2026-01-14T21:22:49.111Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2440 | 2026-01-14T21:22:49.113Z | DEBG | test_vpc_firewall (BackgroundTasks): found DNS version
background_task = dns_config_internal
dns_group = internal
version = 1
|
| 2441 | 2026-01-14T21:22:49.114Z | DEBG | test_vpc_firewall (BackgroundTasks): reading DNS config
background_task = dns_config_internal
dns_group = internal
|
| 2442 | 2026-01-14T21:22:49.114Z | DEBG | test_vpc_firewall (BackgroundTasks): reading DNS zones
background_task = dns_config_internal
dns_group = internal
|
| 2443 | 2026-01-14T21:22:49.114Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 2444 | 2026-01-14T21:22:49.114Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2445 | 2026-01-14T21:22:49.114Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2446 | 2026-01-14T21:22:49.114Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2447 | 2026-01-14T21:22:49.114Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2448 | 2026-01-14T21:22:49.115Z | DEBG | test_vpc_firewall (BackgroundTasks): found DNS version
background_task = dns_config_external
dns_group = external
version = 2
|
| 2449 | 2026-01-14T21:22:49.116Z | DEBG | test_vpc_firewall (BackgroundTasks): reading DNS config
background_task = dns_config_external
dns_group = external
|
| 2450 | 2026-01-14T21:22:49.116Z | DEBG | test_vpc_firewall (BackgroundTasks): reading DNS zones
background_task = dns_config_external
dns_group = external
|
| 2451 | 2026-01-14T21:22:49.116Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 2452 | 2026-01-14T21:22:49.116Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2453 | 2026-01-14T21:22:49.116Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2454 | 2026-01-14T21:22:49.116Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2455 | 2026-01-14T21:22:49.116Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2456 | 2026-01-14T21:22:49.119Z | DEBG | test_vpc_firewall (BackgroundTasks): multicast group member complete deletion finished
background_task = multicast_reconciler
left_and_time_deleted_members_deleted = 0
|
| 2457 | 2026-01-14T21:22:49.119Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation cycle completed
active_groups_verified = 0
background_task = multicast_reconciler
error_count = 0
external_groups_created = 0
external_groups_deleted = 0
member_lifecycle_transitions = 0
orphaned_member_cleanup = 0
total_dpd_operations = 0
|
| 2458 | 2026-01-14T21:22:49.122Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent
background_task = multicast_reconciler
|
| 2459 | 2026-01-14T21:22:49.122Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 765.34793ms
iteration = 2
status = {"disabled":false,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 2460 | 2026-01-14T21:22:49.123Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2461 | 2026-01-14T21:22:49.137Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Blueprint { parent: Fleet, key: 262c300c-11e4-479f-abb4-29db6faa14be, lookup_type: ById(262c300c-11e4-479f-abb4-29db6faa14be) }
result = Ok(())
|
| 2462 | 2026-01-14T21:22:49.137Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
|
| 2463 | 2026-01-14T21:22:49.137Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_loader
roles = RoleSet { roles: {} }
|
| 2464 | 2026-01-14T21:22:49.138Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_loader
resource = Database
result = Ok(())
|
| 2465 | 2026-01-14T21:22:49.140Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2466 | 2026-01-14T21:22:49.152Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 2467 | 2026-01-14T21:22:49.152Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 2468 | 2026-01-14T21:22:49.152Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 2469 | 2026-01-14T21:22:49.152Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 2470 | 2026-01-14T21:22:49.154Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = inventory_loader
elapsed = 799.522902ms
iteration = 2
status = {"Loaded":{"collection_id":"0d2e7770-becb-406e-bb80-957852840966","time_loaded":"2026-01-14T21:22:48.354867158Z","time_started":"2026-01-14T21:22:44.402172Z"}}
|
| 2471 | 2026-01-14T21:22:49.154Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 2
reason = Dependency
|
| 2472 | 2026-01-14T21:22:49.154Z | WARN | test_vpc_firewall (BackgroundTasks): Blueprint rendezvous: skipped
background_task = blueprint_rendezvous
reason = no blueprint
|
| 2473 | 2026-01-14T21:22:49.155Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 41.311\u{b5}s
iteration = 2
status = {"error":"no blueprint"}
|
| 2474 | 2026-01-14T21:22:49.155Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 3
reason = Dependency
|
| 2475 | 2026-01-14T21:22:49.155Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 2476 | 2026-01-14T21:22:49.155Z | TRAC | test_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 2477 | 2026-01-14T21:22:49.155Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 2478 | 2026-01-14T21:22:49.155Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 2
reason = Dependency
|
| 2479 | 2026-01-14T21:22:49.155Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 31.221\u{b5}s
iteration = 2
status = {"error":"task disabled"}
|
| 2480 | 2026-01-14T21:22:49.155Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 3
reason = Dependency
|
| 2481 | 2026-01-14T21:22:49.155Z | DEBG | test_vpc_firewall (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 2482 | 2026-01-14T21:22:49.155Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 23.937\u{b5}s
iteration = 3
status = "Disabled"
|
| 2483 | 2026-01-14T21:22:49.158Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
|
| 2484 | 2026-01-14T21:22:49.158Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = external_endpoints
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2485 | 2026-01-14T21:22:49.158Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2486 | 2026-01-14T21:22:49.158Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2487 | 2026-01-14T21:22:49.159Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2488 | 2026-01-14T21:22:49.162Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2489 | 2026-01-14T21:22:49.173Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 2490 | 2026-01-14T21:22:49.173Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2491 | 2026-01-14T21:22:49.173Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2492 | 2026-01-14T21:22:49.174Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2493 | 2026-01-14T21:22:49.185Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2494 | 2026-01-14T21:22:49.193Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 2495 | 2026-01-14T21:22:49.193Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2496 | 2026-01-14T21:22:49.193Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2497 | 2026-01-14T21:22:49.195Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2498 | 2026-01-14T21:22:49.199Z | DEBG | test_vpc_firewall (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-14T21:22:37.508570Z })
|
| 2499 | 2026-01-14T21:22:49.199Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 208.480083ms
iteration = 3
status = {"config_updated":false}
|
| 2500 | 2026-01-14T21:22:49.202Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2501 | 2026-01-14T21:22:49.209Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Fleet
result = Ok(())
|
| 2502 | 2026-01-14T21:22:49.209Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
|
| 2503 | 2026-01-14T21:22:49.209Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = external_endpoints
roles = RoleSet { roles: {} }
|
| 2504 | 2026-01-14T21:22:49.210Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = external_endpoints
resource = Database
result = Ok(())
|
| 2505 | 2026-01-14T21:22:49.212Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 87 (0x57) bytes\n0000: 59 5f 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c Y_..........._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 .......
kind = dns
peer_addr = [::1]:40997
req_id = 47a86863-d1ef-4349-9030-fedce911df67
|
| 2506 | 2026-01-14T21:22:49.212Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 22879,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:40997
req_id = 47a86863-d1ef-4349-9030-fedce911df67
|
| 2507 | 2026-01-14T21:22:49.213Z | DEBG | test_vpc_firewall (store): query key
key = _clickhouse-admin-keeper._tcp
|
| 2508 | 2026-01-14T21:22:49.213Z | ERRO | test_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest {
header: Header {
id: 22879,
message_type: Query,
op_code: Query,
authoritative: false,
truncation: false,
recursion_desired: true,
recursion_available: false,
authentic_data: false,
checking_disabled: false,
response_code: NoError,
query_count: 1,
answer_count: 0,
name_server_count: 0,
additional_count: 1,
},
queries: Queries {
queries: [
LowerQuery {
name: LowerName(
Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
),
original: Query {
name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),
query_type: SRV,
query_class: IN,
},
},
],
original: [
24,
95,
99,
108,
105,
99,
107,
104,
111,
117,
115,
101,
45,
97,
100,
109,
105,
110,
45,
107,
101,
101,
112,
101,
114,
4,
95,
116,
99,
112,
13,
99,
111,
110,
116,
114,
111,
108,
45,
112,
108,
97,
110,
101,
5,
111,
120,
105,
100,
101,
8,
105,
110,
116,
101,
114,
110,
97,
108,
0,
0,
33,
0,
1,
],
},
answers: [],
name_servers: [],
additionals: [],
sig0: [],
edns: Some(
Edns {
rcode_high: 0,
version: 0,
flags: EdnsFlags {
dnssec_ok: false,
z: 0,
},
max_payload: 1232,
options: OPT {
options: [],
},
},
),
} NXDOMAIN: _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
kind = dns
peer_addr = [::1]:40997
req_id = 47a86863-d1ef-4349-9030-fedce911df67
|
| 2509 | 2026-01-14T21:22:49.213Z | DEBG | test_vpc_firewall (BackgroundTasks): found zones
background_task = dns_config_internal
count = 1
dns_group = internal
|
| 2510 | 2026-01-14T21:22:49.213Z | DEBG | test_vpc_firewall (BackgroundTasks): listing DNS names for zone
background_task = dns_config_internal
batch_size = 100
dns_group = internal
dns_zone_id = cc0b53b7-d35a-45fe-879f-3830389b03f7
dns_zone_name = control-plane.oxide.internal
found_so_far = 0
version = 1
|
| 2511 | 2026-01-14T21:22:49.214Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
|
| 2512 | 2026-01-14T21:22:49.214Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_internal
dns_group = internal
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2513 | 2026-01-14T21:22:49.214Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2514 | 2026-01-14T21:22:49.214Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2515 | 2026-01-14T21:22:49.214Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2516 | 2026-01-14T21:22:49.217Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _cockroach._tcp.control-plane.oxide.internal
|
| 2517 | 2026-01-14T21:22:49.217Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 41 bc 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 A............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:8608
req_id = 3fc4e984-68a7-41d2-9e13-038059cafe99
|
| 2518 | 2026-01-14T21:22:49.217Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 16828,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:8608
req_id = 3fc4e984-68a7-41d2-9e13-038059cafe99
|
| 2519 | 2026-01-14T21:22:49.217Z | DEBG | test_vpc_firewall (store): query key
key = _dendrite._tcp
|
| 2520 | 2026-01-14T21:22:49.218Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 2521 | 2026-01-14T21:22:49.218Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:8608
query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 3fc4e984-68a7-41d2-9e13-038059cafe99
|
| 2522 | 2026-01-14T21:22:49.220Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 606355859 } })
|
| 2523 | 2026-01-14T21:22:49.220Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2524 | 2026-01-14T21:22:49.221Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 73 (0x49) bytes\n0000: 0a 69 01 00 00 01 00 00 00 00 00 01 0a 5f 63 6f .i..........._co\n0010: 63 6b 72 6f 61 63 68 04 5f 74 63 70 0d 63 6f 6e ckroach._tcp.con\n0020: 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 trol-plane.oxide\n0030: 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 .internal..!....\n0040: 29 04 d0 00 00 00 00 00 00 )........
kind = dns
peer_addr = [::1]:41671
req_id = 771e7baa-9ca1-48a1-8af1-c422c605c7b0
|
| 2525 | 2026-01-14T21:22:49.221Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 2665,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_cockroach._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_cockroach._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 10,\n 95,\n 99,\n 111,\n 99,\n 107,\n 114,\n 111,\n 97,\n 99,\n 104,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:41671
req_id = 771e7baa-9ca1-48a1-8af1-c422c605c7b0
|
| 2526 | 2026-01-14T21:22:49.221Z | DEBG | test_vpc_firewall (store): query key
key = _cockroach._tcp
|
| 2527 | 2026-01-14T21:22:49.222Z | DEBG | test_vpc_firewall (store): query key
key = 4ca13454-dc8a-4ce2-981d-d389027c56d3.host
|
| 2528 | 2026-01-14T21:22:49.222Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:41671
query = LowerQuery { name: LowerName(Name("_cockroach._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 46432, target: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal") }) }]
req_id = 771e7baa-9ca1-48a1-8af1-c422c605c7b0
|
| 2529 | 2026-01-14T21:22:49.222Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2530 | 2026-01-14T21:22:49.233Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = DnsConfig
result = Ok(())
|
| 2531 | 2026-01-14T21:22:49.239Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
|
| 2532 | 2026-01-14T21:22:49.239Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_internal
dns_group = internal
roles = RoleSet { roles: {} }
|
| 2533 | 2026-01-14T21:22:49.240Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_internal
dns_group = internal
resource = Database
result = Ok(())
|
| 2534 | 2026-01-14T21:22:49.247Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _cockroach._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 46432, target: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 634029359 } })
|
| 2535 | 2026-01-14T21:22:49.247Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 2536 | 2026-01-14T21:22:49.247Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: 3b a5 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ;...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:42596
req_id = 1b32ed06-2089-4a91-bcb0-bd6c1e4deead
|
| 2537 | 2026-01-14T21:22:49.248Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 15269,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:42596
req_id = 1b32ed06-2089-4a91-bcb0-bd6c1e4deead
|
| 2538 | 2026-01-14T21:22:49.249Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 2539 | 2026-01-14T21:22:49.249Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:42596
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 1b32ed06-2089-4a91-bcb0-bd6c1e4deead
|
| 2540 | 2026-01-14T21:22:49.327Z | TRAC | test_vpc_firewall (DpdClient): client request
background_task = multicast_reconciler
body = None
method = GET
uri = http://[::1]:65194/switch/identifiers
|
| 2541 | 2026-01-14T21:22:49.328Z | DEBG | test_vpc_firewall (BackgroundTasks): found all DNS names for zone
background_task = dns_config_internal
dns_group = internal
dns_zone_id = cc0b53b7-d35a-45fe-879f-3830389b03f7
dns_zone_name = control-plane.oxide.internal
found_so_far = 27
version = 1
|
| 2542 | 2026-01-14T21:22:49.329Z | DEBG | test_vpc_firewall (BackgroundTasks): read DNS config
background_task = dns_config_internal
dns_group = internal
nzones = 1
version = 1
|
| 2543 | 2026-01-14T21:22:49.329Z | INFO | test_vpc_firewall (BackgroundTasks): found latest generation (first find)
background_task = dns_config_internal
dns_group = internal
generation = 1
|
| 2544 | 2026-01-14T21:22:49.329Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_config_internal
dns_group = internal
elapsed = 491.148469ms
iteration = 2
status = {"generation":1}
|
| 2545 | 2026-01-14T21:22:49.329Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_propagation_internal
dns_group = internal
iteration = 3
reason = Dependency
|
| 2546 | 2026-01-14T21:22:49.411Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = dns_propagation_internal
body = Some(Body)
dns_group = internal
dns_server_url = http://[::1]:43592
generation = 1
method = PUT
servers = DnsServersList { addresses: [[::1]:43592] }
uri = http://[::1]:43592/config
|
| 2547 | 2026-01-14T21:22:49.412Z | DEBG | test_vpc_firewall (BackgroundTasks): found zones
background_task = dns_config_external
count = 1
dns_group = external
|
| 2548 | 2026-01-14T21:22:49.412Z | DEBG | test_vpc_firewall (BackgroundTasks): listing DNS names for zone
background_task = dns_config_external
batch_size = 100
dns_group = external
dns_zone_id = 7e523781-957d-4073-ac84-63c22cc8f35c
dns_zone_name = oxide-dev.test
found_so_far = 0
version = 2
|
| 2549 | 2026-01-14T21:22:49.412Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
|
| 2550 | 2026-01-14T21:22:49.413Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = dns_config_external
dns_group = external
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2551 | 2026-01-14T21:22:49.413Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2552 | 2026-01-14T21:22:49.413Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2553 | 2026-01-14T21:22:49.413Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2554 | 2026-01-14T21:22:49.415Z | INFO | test_vpc_firewall (BackgroundTasks): found Silo/DNS/TLS config (initial)
background_task = external_endpoints
config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2026-01-14T21:22:34.357551Z, time_modified: 2026-01-14T21:22:34.357551Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, db_silo: Silo { identity: SiloIdentity { id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-01-14T21:22:47.634984Z, time_modified: 2026-01-14T21:22:47.634984Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, db_silo: Silo { identity: SiloIdentity { id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-01-14T21:22:47.634984Z, time_modified: 2026-01-14T21:22:47.634984Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }) }
|
| 2555 | 2026-01-14T21:22:49.416Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = external_endpoints
elapsed = 573.986149ms
iteration = 2
status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"0fe085d5-9aed-4ef7-a296-b30db2a9c70a","tls_certs":[]}},"default_endpoint":{"silo_id":"0fe085d5-9aed-4ef7-a296-b30db2a9c70a","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 0fe085d5-9aed-4ef7-a296-b30db2a9c70a with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
|
| 2556 | 2026-01-14T21:22:49.417Z | INFO | test_vpc_firewall (http): accepted connection
kind = dns
local_addr = [::1]:43592
remote_addr = [::1]:46000
|
| 2557 | 2026-01-14T21:22:49.418Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 99 (0x63) bytes\n0000: 93 3b 01 00 00 01 00 00 00 00 00 01 24 34 63 61 .;..........$4ca\n0010: 31 33 34 35 34 2d 64 63 38 61 2d 34 63 65 32 2d 13454-dc8a-4ce2-\n0020: 39 38 31 64 2d 64 33 38 39 30 32 37 63 35 36 64 981d-d389027c56d\n0030: 33 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 3.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ...
kind = dns
peer_addr = [::1]:29237
req_id = d5ae6956-ae2f-4d2f-ab17-2cdcc61b9a04
|
| 2558 | 2026-01-14T21:22:49.418Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 37691,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 52,\n 99,\n 97,\n 49,\n 51,\n 52,\n 53,\n 52,\n 45,\n 100,\n 99,\n 56,\n 97,\n 45,\n 52,\n 99,\n 101,\n 50,\n 45,\n 57,\n 56,\n 49,\n 100,\n 45,\n 100,\n 51,\n 56,\n 57,\n 48,\n 50,\n 55,\n 99,\n 53,\n 54,\n 100,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:29237
req_id = d5ae6956-ae2f-4d2f-ab17-2cdcc61b9a04
|
| 2559 | 2026-01-14T21:22:49.418Z | DEBG | test_vpc_firewall (store): query key
key = 4ca13454-dc8a-4ce2-981d-d389027c56d3.host
|
| 2560 | 2026-01-14T21:22:49.419Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:29237
query = LowerQuery { name: LowerName(Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal.")), original: Query { name: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = d5ae6956-ae2f-4d2f-ab17-2cdcc61b9a04
|
| 2561 | 2026-01-14T21:22:49.419Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2562 | 2026-01-14T21:22:49.429Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = DnsConfig
result = Ok(())
|
| 2563 | 2026-01-14T21:22:49.429Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
|
| 2564 | 2026-01-14T21:22:49.429Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = dns_config_external
dns_group = external
roles = RoleSet { roles: {} }
|
| 2565 | 2026-01-14T21:22:49.430Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = dns_config_external
dns_group = external
resource = Database
result = Ok(())
|
| 2566 | 2026-01-14T21:22:49.434Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection
background_task = inventory_collection
|
| 2567 | 2026-01-14T21:22:49.434Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from MGS
background_task = inventory_collection
mgs_url = http://[::1]:59250
|
| 2568 | 2026-01-14T21:22:49.434Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/ignition
|
| 2569 | 2026-01-14T21:22:49.435Z | TRAC | test_vpc_firewall (http): incoming request
kind = dns
local_addr = [::1]:43592
method = PUT
remote_addr = [::1]:46000
req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd
uri = /config
|
| 2570 | 2026-01-14T21:22:49.435Z | DEBG | test_vpc_firewall (http): determined request API version
kind = dns
local_addr = [::1]:43592
method = PUT
remote_addr = [::1]:46000
req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd
uri = /config
version = 2.0.0
|
| 2571 | 2026-01-14T21:22:49.435Z | TRAC | test_vpc_firewall (DpdClient): client response
background_task = multicast_reconciler
result = Ok(Response { url: "http://[::1]:65194/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "984d31e3-ce73-4443-ba71-f80b5a9ffdec", "content-length": "206", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2572 | 2026-01-14T21:22:49.435Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Creating
|
| 2573 | 2026-01-14T21:22:49.436Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2574 | 2026-01-14T21:22:49.436Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2575 | 2026-01-14T21:22:49.436Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2576 | 2026-01-14T21:22:49.438Z | INFO | test_vpc_firewall (store): attempting generation update
new_generation = 1
req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd
|
| 2577 | 2026-01-14T21:22:49.439Z | INFO | test_vpc_firewall (store): updated generation
new_generation = 1
req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd
|
| 2578 | 2026-01-14T21:22:49.439Z | INFO | test_vpc_firewall (http): request completed
kind = dns
latency_us = 4357
local_addr = [::1]:43592
method = PUT
remote_addr = [::1]:46000
req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd
response_code = 204
uri = /config
|
| 2579 | 2026-01-14T21:22:49.442Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:43592
generation = 1
result = Ok(Response { url: "http://[::1]:43592/config", status: 204, headers: {"x-request-id": "88766fde-872a-40e7-bb9b-7c1f46b81ecd", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
servers = DnsServersList { addresses: [[::1]:43592] }
|
| 2580 | 2026-01-14T21:22:49.442Z | INFO | test_vpc_firewall (BackgroundTasks): DNS server now at generation 1
background_task = dns_propagation_internal
dns_group = internal
dns_server_url = http://[::1]:43592
generation = 1
servers = DnsServersList { addresses: [[::1]:43592] }
|
| 2581 | 2026-01-14T21:22:49.444Z | INFO | test_vpc_firewall (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_internal
dns_group = internal
generation = 1
servers = DnsServersList { addresses: [[::1]:43592] }
|
| 2582 | 2026-01-14T21:22:49.444Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_propagation_internal
dns_group = internal
elapsed = 115.519174ms
iteration = 3
status = {"generation":1,"server_results":{"[::1]:43592":{"Ok":null}}}
|
| 2583 | 2026-01-14T21:22:49.445Z | DEBG | test_vpc_firewall (BackgroundTasks): found all DNS names for zone
background_task = dns_config_external
dns_group = external
dns_zone_id = 7e523781-957d-4073-ac84-63c22cc8f35c
dns_zone_name = oxide-dev.test
found_so_far = 3
version = 2
|
| 2584 | 2026-01-14T21:22:49.445Z | DEBG | test_vpc_firewall (BackgroundTasks): read DNS config
background_task = dns_config_external
dns_group = external
nzones = 1
version = 2
|
| 2585 | 2026-01-14T21:22:49.445Z | INFO | test_vpc_firewall (BackgroundTasks): found latest generation (first find)
background_task = dns_config_external
dns_group = external
generation = 2
|
| 2586 | 2026-01-14T21:22:49.445Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_config_external
dns_group = external
elapsed = 605.596374ms
iteration = 2
status = {"generation":2}
|
| 2587 | 2026-01-14T21:22:49.445Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = dns_propagation_external
dns_group = external
iteration = 3
reason = Dependency
|
| 2588 | 2026-01-14T21:22:49.580Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = dns_propagation_external
body = Some(Body)
dns_group = external
dns_server_url = http://[::1]:41277
generation = 2
method = PUT
servers = DnsServersList { addresses: [[::1]:41277] }
uri = http://[::1]:41277/config
|
| 2589 | 2026-01-14T21:22:49.581Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Creating
|
| 2590 | 2026-01-14T21:22:49.581Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Deleting
|
| 2591 | 2026-01-14T21:22:49.581Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2592 | 2026-01-14T21:22:49.581Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2593 | 2026-01-14T21:22:49.582Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2594 | 2026-01-14T21:22:49.584Z | INFO | test_vpc_firewall (http): accepted connection
kind = dns
local_addr = [::1]:41277
remote_addr = [::1]:37698
|
| 2595 | 2026-01-14T21:22:49.592Z | TRAC | test_vpc_firewall (http): incoming request
kind = dns
local_addr = [::1]:41277
method = PUT
remote_addr = [::1]:37698
req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4
uri = /config
|
| 2596 | 2026-01-14T21:22:49.593Z | DEBG | test_vpc_firewall (http): determined request API version
kind = dns
local_addr = [::1]:41277
method = PUT
remote_addr = [::1]:37698
req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4
uri = /config
version = 2.0.0
|
| 2597 | 2026-01-14T21:22:49.593Z | INFO | test_vpc_firewall (store): attempting generation update
new_generation = 2
req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4
|
| 2598 | 2026-01-14T21:22:49.593Z | INFO | test_vpc_firewall (store): pruning trees for generations newer than 0
|
| 2599 | 2026-01-14T21:22:49.593Z | DEBG | test_vpc_firewall (store): creating tree
tree_name = generation_2_zone_oxide-dev.test
|
| 2600 | 2026-01-14T21:22:49.594Z | DEBG | test_vpc_firewall (store): updating current config
|
| 2601 | 2026-01-14T21:22:49.594Z | DEBG | test_vpc_firewall (store): flushing default tree
|
| 2602 | 2026-01-14T21:22:49.594Z | INFO | test_vpc_firewall (store): pruning trees for generations older than 2
keep = 3
|
| 2603 | 2026-01-14T21:22:49.594Z | INFO | test_vpc_firewall (store): updated generation
new_generation = 2
req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4
|
| 2604 | 2026-01-14T21:22:49.594Z | INFO | test_vpc_firewall (http): request completed
kind = dns
latency_us = 2077
local_addr = [::1]:41277
method = PUT
remote_addr = [::1]:37698
req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4
response_code = 204
uri = /config
|
| 2605 | 2026-01-14T21:22:49.596Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:41277
generation = 2
result = Ok(Response { url: "http://[::1]:41277/config", status: 204, headers: {"x-request-id": "1e0ba954-65e5-444b-9b1c-fec4dfd207a4", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
servers = DnsServersList { addresses: [[::1]:41277] }
|
| 2606 | 2026-01-14T21:22:49.596Z | INFO | test_vpc_firewall (BackgroundTasks): DNS server now at generation 2
background_task = dns_propagation_external
dns_group = external
dns_server_url = http://[::1]:41277
generation = 2
servers = DnsServersList { addresses: [[::1]:41277] }
|
| 2607 | 2026-01-14T21:22:49.598Z | INFO | test_vpc_firewall (BackgroundTasks): DNS propagation: done
background_task = dns_propagation_external
dns_group = external
generation = 2
servers = DnsServersList { addresses: [[::1]:41277] }
|
| 2608 | 2026-01-14T21:22:49.598Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = dns_propagation_external
dns_group = external
elapsed = 152.651155ms
iteration = 3
status = {"generation":2,"server_results":{"[::1]:41277":{"Ok":null}}}
|
| 2609 | 2026-01-14T21:22:49.599Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Deleting
|
| 2610 | 2026-01-14T21:22:49.599Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Active
|
| 2611 | 2026-01-14T21:22:49.599Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2612 | 2026-01-14T21:22:49.599Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2613 | 2026-01-14T21:22:49.600Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2614 | 2026-01-14T21:22:49.603Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "84a06048-19f8-48e8-befa-509f2d9d1b4f", "content-length": "835", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2615 | 2026-01-14T21:22:49.604Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0
|
| 2616 | 2026-01-14T21:22:49.643Z | INFO | test_vpc_firewall (BackgroundTasks): found new target blueprint (first find)
background_task = blueprint_loader
target_id = 262c300c-11e4-479f-abb4-29db6faa14be
time_created = 2026-01-14 21:22:43.883217 UTC
|
| 2617 | 2026-01-14T21:22:49.643Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_loader
elapsed = 798.683932ms
iteration = 2
status = {"enabled":false,"status":"first target blueprint","target_id":"262c300c-11e4-479f-abb4-29db6faa14be","time_created":"2026-01-14T21:22:43.883217Z","time_found":"2026-01-14T21:22:49.643186411Z"}
|
| 2618 | 2026-01-14T21:22:49.643Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = crdb_node_id_collector
iteration = 2
reason = Dependency
|
| 2619 | 2026-01-14T21:22:49.643Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Fleet
|
| 2620 | 2026-01-14T21:22:49.643Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = crdb_node_id_collector
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2621 | 2026-01-14T21:22:49.643Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
|
| 2622 | 2026-01-14T21:22:49.643Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {} }
|
| 2623 | 2026-01-14T21:22:49.644Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
result = Ok(())
|
| 2624 | 2026-01-14T21:22:49.649Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 4
reason = Dependency
|
| 2625 | 2026-01-14T21:22:49.649Z | DEBG | test_vpc_firewall (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 2626 | 2026-01-14T21:22:49.649Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 75.678\u{b5}s
iteration = 4
status = "Disabled"
|
| 2627 | 2026-01-14T21:22:49.649Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_executor
iteration = 2
reason = Dependency
|
| 2628 | 2026-01-14T21:22:49.649Z | DEBG | test_vpc_firewall (BackgroundTasks): blueprint execution: quiesce check
background_task = blueprint_executor
quiescing = false
|
| 2629 | 2026-01-14T21:22:49.649Z | INFO | test_vpc_firewall (NexusQuiesceHandle): initial state
state = Running
|
| 2630 | 2026-01-14T21:22:49.649Z | INFO | test_vpc_firewall (SagaQuiesceHandle): initial quiesce state
initial_state = Allowed
|
| 2631 | 2026-01-14T21:22:49.649Z | WARN | test_vpc_firewall (BackgroundTasks): Blueprint execution: skipped
background_task = blueprint_executor
reason = blueprint disabled
target_id = 262c300c-11e4-479f-abb4-29db6faa14be
|
| 2632 | 2026-01-14T21:22:49.649Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_executor
elapsed = 162.069\u{b5}s
iteration = 2
status = {"enabled":false,"target_id":"262c300c-11e4-479f-abb4-29db6faa14be"}
|
| 2633 | 2026-01-14T21:22:49.650Z | TRAC | test_vpc_firewall (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
|
| 2634 | 2026-01-14T21:22:49.650Z | DEBG | test_vpc_firewall (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
| 2635 | 2026-01-14T21:22:49.651Z | DEBG | test_vpc_firewall (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2636 | 2026-01-14T21:22:49.652Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0f52412a-e5c7-460a-ad1d-6e6a3483bb35", "content-length": "734", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2637 | 2026-01-14T21:22:49.653Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=0
|
| 2638 | 2026-01-14T21:22:49.656Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2639 | 2026-01-14T21:22:49.662Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Fleet
result = Ok(())
|
| 2640 | 2026-01-14T21:22:49.663Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
|
| 2641 | 2026-01-14T21:22:49.663Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = crdb_node_id_collector
roles = RoleSet { roles: {} }
|
| 2642 | 2026-01-14T21:22:49.663Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = crdb_node_id_collector
resource = Database
result = Ok(())
|
| 2643 | 2026-01-14T21:22:49.670Z | TRAC | test_vpc_firewall (ServiceBalancer): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
|
| 2644 | 2026-01-14T21:22:49.672Z | TRAC | test_vpc_firewall (ServiceBalancer): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2645 | 2026-01-14T21:22:49.672Z | TRAC | test_vpc_firewall (ServiceBalancer): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
|
| 2646 | 2026-01-14T21:22:49.672Z | DEBG | test_vpc_firewall (ServiceBalancer): roles
roles = RoleSet { roles: {} }
|
| 2647 | 2026-01-14T21:22:49.673Z | DEBG | test_vpc_firewall (ServiceBalancer): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2648 | 2026-01-14T21:22:49.685Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Active
|
| 2649 | 2026-01-14T21:22:49.685Z | TRAC | test_vpc_firewall (BackgroundTasks): reconciling member state changes
background_task = multicast_reconciler
|
| 2650 | 2026-01-14T21:22:49.685Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2651 | 2026-01-14T21:22:49.685Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2652 | 2026-01-14T21:22:49.686Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2653 | 2026-01-14T21:22:49.755Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = crdb_node_id_collector
body = None
method = GET
uri = http://[::1]:32222/node/id
|
| 2654 | 2026-01-14T21:22:49.755Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = crdb_node_id_collector
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 2655 | 2026-01-14T21:22:49.757Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = crdb_node_id_collector
elapsed = 113.755734ms
iteration = 2
status = {"errors":[{"err":"failed to fetch node ID for zone 4ca13454-dc8a-4ce2-981d-d389027c56d3 at http://[::1]:32222: Communication Error: error sending request for url (http://[::1]:32222/node/id): error sending request for url (http://[::1]:32222/node/id): client error (Connect): tcp connect error: Connection refused (os error 146)","zone_id":"4ca13454-dc8a-4ce2-981d-d389027c56d3"}],"nsuccess":0}
|
| 2656 | 2026-01-14T21:22:49.757Z | DEBG | test_vpc_firewall (ServiceBalancer): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2657 | 2026-01-14T21:22:49.765Z | DEBG | test_vpc_firewall (ServiceBalancer): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. })
resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
result = Ok(())
|
| 2658 | 2026-01-14T21:22:49.765Z | INFO | test_vpc_firewall (nexus): Rack initialized
|
| 2659 | 2026-01-14T21:22:49.765Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2660 | 2026-01-14T21:22:49.765Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2661 | 2026-01-14T21:22:49.766Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2662 | 2026-01-14T21:22:49.768Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2663 | 2026-01-14T21:22:49.768Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2664 | 2026-01-14T21:22:49.769Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2665 | 2026-01-14T21:22:49.773Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6c998af3-7407-4335-86c6-cdc249858d2a", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2666 | 2026-01-14T21:22:49.774Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=1
|
| 2667 | 2026-01-14T21:22:49.775Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2668 | 2026-01-14T21:22:49.775Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2669 | 2026-01-14T21:22:49.776Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2670 | 2026-01-14T21:22:49.778Z | DEBG | test_vpc_firewall (BackgroundTasks): found groups for member reconciliation
background_task = multicast_reconciler
total_groups = 0
|
| 2671 | 2026-01-14T21:22:49.778Z | DEBG | test_vpc_firewall (BackgroundTasks): member state reconciliation completed
background_task = multicast_reconciler
members_processed = 0
|
| 2672 | 2026-01-14T21:22:49.778Z | TRAC | test_vpc_firewall (BackgroundTasks): cleaning up deleted multicast members
background_task = multicast_reconciler
|
| 2673 | 2026-01-14T21:22:49.778Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 2674 | 2026-01-14T21:22:49.779Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 2675 | 2026-01-14T21:22:49.780Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 2676 | 2026-01-14T21:22:49.783Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2677 | 2026-01-14T21:22:49.784Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2678 | 2026-01-14T21:22:49.785Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2679 | 2026-01-14T21:22:49.786Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "bb5a15ee-3e32-44d6-9d3c-7a8e428c128a", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2680 | 2026-01-14T21:22:49.786Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=0
|
| 2681 | 2026-01-14T21:22:49.789Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed91135a-0847-4aba-b698-8582fb55c044", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2682 | 2026-01-14T21:22:49.789Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=1
|
| 2683 | 2026-01-14T21:22:49.790Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2684 | 2026-01-14T21:22:49.790Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2685 | 2026-01-14T21:22:49.790Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2686 | 2026-01-14T21:22:49.790Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2687 | 2026-01-14T21:22:49.791Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2688 | 2026-01-14T21:22:49.794Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9cef0a8-1a5a-45e7-bf70-e400afbe66d0", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2689 | 2026-01-14T21:22:49.795Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=0
|
| 2690 | 2026-01-14T21:22:49.798Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "38d91f3c-426b-4423-bc63-4d9b7a932f01", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2691 | 2026-01-14T21:22:49.798Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=1
|
| 2692 | 2026-01-14T21:22:49.800Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "48474332-c15b-40e4-8851-c0e74c13d6b9", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2693 | 2026-01-14T21:22:49.800Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/cmpa
|
| 2694 | 2026-01-14T21:22:49.802Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed75abaf-a6df-4fa0-8312-71b4e1a796b0", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2695 | 2026-01-14T21:22:49.802Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
|
| 2696 | 2026-01-14T21:22:49.803Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b5e5f5bd-97ba-4e4a-bd30-6eb20c3df6f6", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2697 | 2026-01-14T21:22:49.803Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
|
| 2698 | 2026-01-14T21:22:49.805Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f381509c-ed5d-49de-9d17-03c6fd4a4819", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2699 | 2026-01-14T21:22:49.805Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
|
| 2700 | 2026-01-14T21:22:49.815Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1070a561-f83a-46e3-989a-b4625732b79d", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2701 | 2026-01-14T21:22:49.815Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1
|
| 2702 | 2026-01-14T21:22:49.816Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2703 | 2026-01-14T21:22:49.816Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2704 | 2026-01-14T21:22:49.816Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2705 | 2026-01-14T21:22:49.817Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2706 | 2026-01-14T21:22:49.820Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "97984b89-663f-4299-a690-909f800f2d77", "content-length": "734", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2707 | 2026-01-14T21:22:49.821Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=0
|
| 2708 | 2026-01-14T21:22:49.823Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9ac9699c-8089-4e4c-b454-851c34a302e7", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2709 | 2026-01-14T21:22:49.823Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=1
|
| 2710 | 2026-01-14T21:22:49.824Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2711 | 2026-01-14T21:22:49.824Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2712 | 2026-01-14T21:22:49.824Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2713 | 2026-01-14T21:22:49.825Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2714 | 2026-01-14T21:22:49.832Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "75466c1d-4207-40e9-b773-6e90542fd9e7", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2715 | 2026-01-14T21:22:49.832Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=0
|
| 2716 | 2026-01-14T21:22:49.838Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "56a54102-ac7e-49a5-93ed-5b5552b9a2bf", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2717 | 2026-01-14T21:22:49.838Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=1
|
| 2718 | 2026-01-14T21:22:49.843Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6f836106-9bde-4823-9161-9e0fa2cfbf87", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2719 | 2026-01-14T21:22:49.843Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=0
|
| 2720 | 2026-01-14T21:22:49.844Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2721 | 2026-01-14T21:22:49.858Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2722 | 2026-01-14T21:22:49.858Z | TRAC | test_vpc_firewall (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 2723 | 2026-01-14T21:22:49.858Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2724 | 2026-01-14T21:22:49.858Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2725 | 2026-01-14T21:22:49.858Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2726 | 2026-01-14T21:22:49.859Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2727 | 2026-01-14T21:22:49.859Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2728 | 2026-01-14T21:22:49.863Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a39cfb47-8c47-47e5-86be-21ff1c533d2e", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2729 | 2026-01-14T21:22:49.864Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=1
|
| 2730 | 2026-01-14T21:22:49.866Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "23ed68ef-333b-4853-86f0-85ca8a39bdd7", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2731 | 2026-01-14T21:22:49.866Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/cmpa
|
| 2732 | 2026-01-14T21:22:49.867Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2733 | 2026-01-14T21:22:49.867Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2734 | 2026-01-14T21:22:49.867Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2735 | 2026-01-14T21:22:49.868Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2736 | 2026-01-14T21:22:49.871Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d3ef301a-7049-4789-a1e8-f6cd072e0f81", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2737 | 2026-01-14T21:22:49.871Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
|
| 2738 | 2026-01-14T21:22:49.872Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5b862a2a-6d19-406e-921f-12bf5016aabd", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2739 | 2026-01-14T21:22:49.873Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
|
| 2740 | 2026-01-14T21:22:49.876Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2741 | 2026-01-14T21:22:49.876Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2742 | 2026-01-14T21:22:49.877Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2743 | 2026-01-14T21:22:49.877Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2744 | 2026-01-14T21:22:49.879Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f735541-eb00-46f4-9141-4838e2df3e32", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2745 | 2026-01-14T21:22:49.880Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
|
| 2746 | 2026-01-14T21:22:49.880Z | DEBG | test_vpc_firewall (BackgroundTasks): multicast group member complete deletion finished
background_task = multicast_reconciler
left_and_time_deleted_members_deleted = 0
|
| 2747 | 2026-01-14T21:22:49.880Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation cycle completed
active_groups_verified = 0
background_task = multicast_reconciler
error_count = 0
external_groups_created = 0
external_groups_deleted = 0
member_lifecycle_transitions = 0
orphaned_member_cleanup = 0
total_dpd_operations = 0
|
| 2748 | 2026-01-14T21:22:49.883Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent
background_task = multicast_reconciler
|
| 2749 | 2026-01-14T21:22:49.883Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 728.85662ms
iteration = 3
status = {"disabled":false,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 2750 | 2026-01-14T21:22:49.886Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c506c068-ac5b-403c-b531-c62ef5c8e25b", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2751 | 2026-01-14T21:22:49.888Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0
|
| 2752 | 2026-01-14T21:22:49.890Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2753 | 2026-01-14T21:22:49.902Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2754 | 2026-01-14T21:22:49.903Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2755 | 2026-01-14T21:22:49.903Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2756 | 2026-01-14T21:22:49.903Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2757 | 2026-01-14T21:22:49.906Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "57ac1cc2-99ae-43b6-b621-1a42d2a442a8", "content-length": "723", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2758 | 2026-01-14T21:22:49.906Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/active-slot
|
| 2759 | 2026-01-14T21:22:49.908Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "5706b16e-be67-4229-9e35-0154b6f0390f", "content-length": "10", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2760 | 2026-01-14T21:22:49.908Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/0
|
| 2761 | 2026-01-14T21:22:49.908Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2762 | 2026-01-14T21:22:49.908Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2763 | 2026-01-14T21:22:49.909Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2764 | 2026-01-14T21:22:49.912Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6ef9fc88-25e8-4d7d-bf52-6eea327ef289", "content-length": "144", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2765 | 2026-01-14T21:22:49.912Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/1
|
| 2766 | 2026-01-14T21:22:49.914Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "66eac08d-0dd2-4523-90e0-01d1d02fca3c", "content-length": "147", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2767 | 2026-01-14T21:22:49.914Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=0
|
| 2768 | 2026-01-14T21:22:49.915Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2769 | 2026-01-14T21:22:49.915Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2770 | 2026-01-14T21:22:49.916Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2771 | 2026-01-14T21:22:49.920Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "019d5bf3-8c52-436d-bfca-b471db65ead8", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2772 | 2026-01-14T21:22:49.920Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=1
|
| 2773 | 2026-01-14T21:22:49.921Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2774 | 2026-01-14T21:22:49.921Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2775 | 2026-01-14T21:22:49.922Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2776 | 2026-01-14T21:22:49.926Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "379b5131-c631-4f92-96ff-014a4699a14e", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2777 | 2026-01-14T21:22:49.926Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=0
|
| 2778 | 2026-01-14T21:22:49.927Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
|
| 2779 | 2026-01-14T21:22:49.927Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2780 | 2026-01-14T21:22:49.927Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2781 | 2026-01-14T21:22:49.927Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2782 | 2026-01-14T21:22:49.928Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2783 | 2026-01-14T21:22:49.933Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4e855aa9-422e-44fa-b778-fe9025312016", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2784 | 2026-01-14T21:22:49.933Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=1
|
| 2785 | 2026-01-14T21:22:49.934Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2786 | 2026-01-14T21:22:49.934Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2787 | 2026-01-14T21:22:49.934Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2788 | 2026-01-14T21:22:49.935Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2789 | 2026-01-14T21:22:49.938Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ec17032e-b02b-429a-a23e-e464bcdf3b1d", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2790 | 2026-01-14T21:22:49.939Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=0
|
| 2791 | 2026-01-14T21:22:49.939Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2792 | 2026-01-14T21:22:49.939Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2793 | 2026-01-14T21:22:49.939Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2794 | 2026-01-14T21:22:49.940Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2795 | 2026-01-14T21:22:49.943Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e7a0daa7-2172-465f-ade0-ada92894efc2", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2796 | 2026-01-14T21:22:49.944Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=1
|
| 2797 | 2026-01-14T21:22:49.944Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2798 | 2026-01-14T21:22:49.956Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
result = Ok(())
|
| 2799 | 2026-01-14T21:22:49.956Z | TRAC | test_vpc_firewall (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
|
| 2800 | 2026-01-14T21:22:49.956Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2801 | 2026-01-14T21:22:49.956Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2802 | 2026-01-14T21:22:49.957Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2803 | 2026-01-14T21:22:49.961Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ec0d1d59-6d8a-468d-b0ba-f49d6a8c2318", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2804 | 2026-01-14T21:22:49.961Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/cmpa
|
| 2805 | 2026-01-14T21:22:49.961Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2806 | 2026-01-14T21:22:49.962Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2807 | 2026-01-14T21:22:49.963Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2808 | 2026-01-14T21:22:49.968Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8394d20a-5eb0-4baf-a691-6af97be1ab7a", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2809 | 2026-01-14T21:22:49.968Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
|
| 2810 | 2026-01-14T21:22:49.970Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a90ba466-4577-4c78-a438-f892ac0fe8e2", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2811 | 2026-01-14T21:22:49.970Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
|
| 2812 | 2026-01-14T21:22:49.971Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2813 | 2026-01-14T21:22:49.971Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2814 | 2026-01-14T21:22:49.972Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2815 | 2026-01-14T21:22:49.976Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "19bdde2b-1cd6-4dd3-920a-c385751607de", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2816 | 2026-01-14T21:22:49.976Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
|
| 2817 | 2026-01-14T21:22:49.979Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2818 | 2026-01-14T21:22:49.979Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2819 | 2026-01-14T21:22:49.981Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2820 | 2026-01-14T21:22:49.982Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6bab6044-3253-46e4-95a1-fbc5d243af36", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2821 | 2026-01-14T21:22:49.982Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1
|
| 2822 | 2026-01-14T21:22:49.987Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "dc651d02-fc9d-493b-b70c-0e405d56a379", "content-length": "723", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2823 | 2026-01-14T21:22:49.987Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/active-slot
|
| 2824 | 2026-01-14T21:22:49.989Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 2825 | 2026-01-14T21:22:49.989Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2826 | 2026-01-14T21:22:49.989Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2827 | 2026-01-14T21:22:49.989Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2828 | 2026-01-14T21:22:49.990Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2829 | 2026-01-14T21:22:49.991Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "9d5220fa-6cda-402a-9f48-2715dce56f28", "content-length": "10", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2830 | 2026-01-14T21:22:49.991Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/0
|
| 2831 | 2026-01-14T21:22:49.995Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a87f6547-92c6-459e-ad14-68808f7d72ee", "content-length": "144", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
|
| 2832 | 2026-01-14T21:22:49.995Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/1
|
| 2833 | 2026-01-14T21:22:49.996Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2834 | 2026-01-14T21:22:49.996Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2835 | 2026-01-14T21:22:49.996Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2836 | 2026-01-14T21:22:49.997Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2837 | 2026-01-14T21:22:50.005Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0354c0c0-c49b-4073-a6f0-b654e693ebea", "content-length": "147", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2838 | 2026-01-14T21:22:50.005Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=0
|
| 2839 | 2026-01-14T21:22:50.008Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2840 | 2026-01-14T21:22:50.008Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2841 | 2026-01-14T21:22:50.008Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2842 | 2026-01-14T21:22:50.009Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2843 | 2026-01-14T21:22:50.013Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5a5a8e26-c3a5-42e7-95f3-5f2349bcbd65", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2844 | 2026-01-14T21:22:50.013Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=1
|
| 2845 | 2026-01-14T21:22:50.018Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2846 | 2026-01-14T21:22:50.032Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 2847 | 2026-01-14T21:22:50.032Z | TRAC | test_vpc_firewall (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 2848 | 2026-01-14T21:22:50.032Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
|
| 2849 | 2026-01-14T21:22:50.032Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2850 | 2026-01-14T21:22:50.032Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2851 | 2026-01-14T21:22:50.032Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2852 | 2026-01-14T21:22:50.034Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2853 | 2026-01-14T21:22:50.039Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c3147186-8a09-4a79-bda1-f191e07ecd84", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2854 | 2026-01-14T21:22:50.039Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=0
|
| 2855 | 2026-01-14T21:22:50.040Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2856 | 2026-01-14T21:22:50.040Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2857 | 2026-01-14T21:22:50.040Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2858 | 2026-01-14T21:22:50.041Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2859 | 2026-01-14T21:22:50.046Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2bbe282b-28d5-4e65-adb2-e508b9e77407", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2860 | 2026-01-14T21:22:50.046Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=1
|
| 2861 | 2026-01-14T21:22:50.046Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2862 | 2026-01-14T21:22:50.047Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2863 | 2026-01-14T21:22:50.047Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2864 | 2026-01-14T21:22:50.047Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2865 | 2026-01-14T21:22:50.051Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e9fd38c3-f2c2-4139-84af-0e5b2fe54237", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2866 | 2026-01-14T21:22:50.052Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=0
|
| 2867 | 2026-01-14T21:22:50.053Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2868 | 2026-01-14T21:22:50.071Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
result = Ok(())
|
| 2869 | 2026-01-14T21:22:50.071Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2870 | 2026-01-14T21:22:50.071Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2871 | 2026-01-14T21:22:50.073Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2872 | 2026-01-14T21:22:50.078Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "df1dc756-053d-41d4-9abb-89441c4479d0", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2873 | 2026-01-14T21:22:50.079Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=1
|
| 2874 | 2026-01-14T21:22:50.080Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2875 | 2026-01-14T21:22:50.080Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2876 | 2026-01-14T21:22:50.081Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2877 | 2026-01-14T21:22:50.086Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "05cecb9b-2c39-4977-b980-da5d9484eaf6", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2878 | 2026-01-14T21:22:50.086Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/cmpa
|
| 2879 | 2026-01-14T21:22:50.087Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2880 | 2026-01-14T21:22:50.087Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2881 | 2026-01-14T21:22:50.089Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2882 | 2026-01-14T21:22:50.093Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "49e39649-0d0f-46ef-b88e-52b4efa9a3e1", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2883 | 2026-01-14T21:22:50.093Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
|
| 2884 | 2026-01-14T21:22:50.095Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8c3605ef-589e-430a-be7a-068f09d31955", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2885 | 2026-01-14T21:22:50.095Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
|
| 2886 | 2026-01-14T21:22:50.096Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2887 | 2026-01-14T21:22:50.096Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2888 | 2026-01-14T21:22:50.097Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2889 | 2026-01-14T21:22:50.101Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8485085a-23be-4e95-8e05-1f5f740796ae", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2890 | 2026-01-14T21:22:50.101Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = Some(Body)
gateway_url = http://[::1]:59250
method = GET
uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
|
| 2891 | 2026-01-14T21:22:50.104Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
gateway_url = http://[::1]:59250
result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2500cc9d-bb68-4526-abc5-c2394437a0f2", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2892 | 2026-01-14T21:22:50.104Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
|
| 2893 | 2026-01-14T21:22:50.104Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2894 | 2026-01-14T21:22:50.104Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2895 | 2026-01-14T21:22:50.104Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2896 | 2026-01-14T21:22:50.106Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2897 | 2026-01-14T21:22:50.108Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2898 | 2026-01-14T21:22:50.108Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2899 | 2026-01-14T21:22:50.110Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2900 | 2026-01-14T21:22:50.114Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2901 | 2026-01-14T21:22:50.124Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
| 2902 | 2026-01-14T21:22:50.124Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
|
| 2903 | 2026-01-14T21:22:50.124Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2904 | 2026-01-14T21:22:50.124Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2905 | 2026-01-14T21:22:50.124Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2906 | 2026-01-14T21:22:50.128Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2907 | 2026-01-14T21:22:50.129Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 2908 | 2026-01-14T21:22:50.129Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2909 | 2026-01-14T21:22:50.129Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2910 | 2026-01-14T21:22:50.129Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2911 | 2026-01-14T21:22:50.138Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2912 | 2026-01-14T21:22:50.152Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2913 | 2026-01-14T21:22:50.163Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Fleet
result = Ok(())
|
| 2914 | 2026-01-14T21:22:50.163Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2915 | 2026-01-14T21:22:50.163Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2916 | 2026-01-14T21:22:50.177Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2917 | 2026-01-14T21:22:50.184Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2918 | 2026-01-14T21:22:50.185Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2919 | 2026-01-14T21:22:50.185Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2920 | 2026-01-14T21:22:50.186Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2921 | 2026-01-14T21:22:50.271Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from Sled Agent
background_task = inventory_collection
sled_agent_url = http://[::1]:60096
|
| 2922 | 2026-01-14T21:22:50.272Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
SledAgent = http://[::1]:60096
background_task = inventory_collection
body = None
method = GET
uri = http://[::1]:60096/inventory
|
| 2923 | 2026-01-14T21:22:50.275Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:35880
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 2924 | 2026-01-14T21:22:50.277Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:35880
req_id = 28d12134-3f2b-4f47-8fc4-29be21c196e3
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
| 2925 | 2026-01-14T21:22:50.277Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:35880
req_id = 28d12134-3f2b-4f47-8fc4-29be21c196e3
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
version = 12.0.0
|
| 2926 | 2026-01-14T21:22:50.280Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 3208
local_addr = [::1]:60096
method = GET
remote_addr = [::1]:35880
req_id = 28d12134-3f2b-4f47-8fc4-29be21c196e3
response_code = 200
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /inventory
|
| 2927 | 2026-01-14T21:22:50.281Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2928 | 2026-01-14T21:22:50.281Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2929 | 2026-01-14T21:22:50.281Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2930 | 2026-01-14T21:22:50.282Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2931 | 2026-01-14T21:22:50.284Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
SledAgent = http://[::1]:60096
background_task = inventory_collection
result = Ok(Response { url: "http://[::1]:60096/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "28d12134-3f2b-4f47-8fc4-29be21c196e3", "content-length": "20208", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2932 | 2026-01-14T21:22:50.292Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
| 2933 | 2026-01-14T21:22:50.292Z | DEBG | test_vpc_firewall (BackgroundTasks): end collecting all keepers
background_task = inventory_collection
nkeeper_admin_clients = 0
|
| 2934 | 2026-01-14T21:22:50.292Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from CockroachDB nodes
background_task = inventory_collection
|
| 2935 | 2026-01-14T21:22:50.293Z | DEBG | test_vpc_firewall (CockroachClusterAdminClient): client request
body = None
method = GET
uri = http://[::1]:32222/node/id
|
| 2936 | 2026-01-14T21:22:50.293Z | DEBG | test_vpc_firewall (CockroachClusterAdminClient): client response
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 2937 | 2026-01-14T21:22:50.294Z | WARN | test_vpc_firewall (CockroachClusterAdminClient): Failed to fetch metrics from CockroachDB node
error = Failed to get node ID from [::1]:32222
|
| 2938 | 2026-01-14T21:22:50.377Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from NTP admin (timesync)
background_task = inventory_collection
sled_agent_url = http://[::1]:10123
zone_id = 541d5209-e75f-4f24-a362-01ff39fdfcab (omicron_zone)
|
| 2939 | 2026-01-14T21:22:50.377Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
method = GET
ntp_admin_url = http://[::1]:10123
uri = http://[::1]:10123/timesync
|
| 2940 | 2026-01-14T21:22:50.378Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
ntp_admin_url = http://[::1]:10123
result = Err(reqwest::Error { kind: Request, url: "http://[::1]:10123/timesync", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:10123, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
|
| 2941 | 2026-01-14T21:22:50.381Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from internal DNS servers
background_task = inventory_collection
|
| 2942 | 2026-01-14T21:22:50.452Z | DEBG | test_vpc_firewall (BackgroundTasks): begin collection from DNS server
background_task = inventory_collection
zone_id = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b (omicron_zone)
|
| 2943 | 2026-01-14T21:22:50.452Z | DEBG | test_vpc_firewall (BackgroundTasks): client request
background_task = inventory_collection
body = None
internal_dns_url = http://[::1]:43592
method = GET
uri = http://[::1]:43592/config
|
| 2944 | 2026-01-14T21:22:50.453Z | INFO | test_vpc_firewall (http): accepted connection
kind = dns
local_addr = [::1]:43592
remote_addr = [::1]:55518
|
| 2945 | 2026-01-14T21:22:50.455Z | TRAC | test_vpc_firewall (http): incoming request
kind = dns
local_addr = [::1]:43592
method = GET
remote_addr = [::1]:55518
req_id = ae86f80f-42c9-4bed-ae7d-51a7045e4826
uri = /config
|
| 2946 | 2026-01-14T21:22:50.455Z | DEBG | test_vpc_firewall (http): determined request API version
kind = dns
local_addr = [::1]:43592
method = GET
remote_addr = [::1]:55518
req_id = ae86f80f-42c9-4bed-ae7d-51a7045e4826
uri = /config
version = 2.0.0
|
| 2947 | 2026-01-14T21:22:50.456Z | INFO | test_vpc_firewall (http): request completed
kind = dns
latency_us = 1595
local_addr = [::1]:43592
method = GET
remote_addr = [::1]:55518
req_id = ae86f80f-42c9-4bed-ae7d-51a7045e4826
response_code = 200
uri = /config
|
| 2948 | 2026-01-14T21:22:50.457Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2949 | 2026-01-14T21:22:50.476Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2950 | 2026-01-14T21:22:50.477Z | TRAC | test_vpc_firewall (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
|
| 2951 | 2026-01-14T21:22:50.477Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
|
| 2952 | 2026-01-14T21:22:50.477Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-4401-4000-8000-000000000000
resource_type = Project
|
| 2953 | 2026-01-14T21:22:50.477Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2954 | 2026-01-14T21:22:50.477Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2955 | 2026-01-14T21:22:50.478Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2956 | 2026-01-14T21:22:50.495Z | DEBG | test_vpc_firewall (BackgroundTasks): client response
background_task = inventory_collection
internal_dns_url = http://[::1]:43592
result = Ok(Response { url: "http://[::1]:43592/config", status: 200, headers: {"content-type": "application/json", "x-request-id": "ae86f80f-42c9-4bed-ae7d-51a7045e4826", "content-length": "3478", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 2957 | 2026-01-14T21:22:50.496Z | DEBG | test_vpc_firewall (BackgroundTasks): finished collection from DNS server
background_task = inventory_collection
zone_id = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b (omicron_zone)
|
| 2958 | 2026-01-14T21:22:50.500Z | DEBG | test_vpc_firewall (BackgroundTasks): finished collection from internal DNS servers
background_task = inventory_collection
|
| 2959 | 2026-01-14T21:22:50.500Z | DEBG | test_vpc_firewall (BackgroundTasks): finished collection
background_task = inventory_collection
|
| 2960 | 2026-01-14T21:22:50.516Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
|
| 2961 | 2026-01-14T21:22:50.518Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_collection
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2962 | 2026-01-14T21:22:50.518Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2963 | 2026-01-14T21:22:50.518Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2964 | 2026-01-14T21:22:50.519Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2965 | 2026-01-14T21:22:50.530Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000001
resource_type = Silo
|
| 2966 | 2026-01-14T21:22:50.530Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2967 | 2026-01-14T21:22:50.530Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2968 | 2026-01-14T21:22:50.532Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2969 | 2026-01-14T21:22:50.533Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2970 | 2026-01-14T21:22:50.547Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Inventory
result = Ok(())
|
| 2971 | 2026-01-14T21:22:50.547Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
|
| 2972 | 2026-01-14T21:22:50.547Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_collection
roles = RoleSet { roles: {} }
|
| 2973 | 2026-01-14T21:22:50.548Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_collection
resource = Database
result = Ok(())
|
| 2974 | 2026-01-14T21:22:50.553Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2975 | 2026-01-14T21:22:50.553Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2976 | 2026-01-14T21:22:50.553Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2977 | 2026-01-14T21:22:50.554Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2978 | 2026-01-14T21:22:50.563Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2979 | 2026-01-14T21:22:50.579Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
result = Ok(())
|
| 2980 | 2026-01-14T21:22:50.579Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2981 | 2026-01-14T21:22:50.579Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2982 | 2026-01-14T21:22:50.591Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2983 | 2026-01-14T21:22:50.659Z | DEBG | test_vpc_firewall (InternalApi): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], Name("nexus"): [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }]}
subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]}
vpc_interfaces = {}
|
| 2984 | 2026-01-14T21:22:50.659Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
|
| 2985 | 2026-01-14T21:22:50.659Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 2986 | 2026-01-14T21:22:50.659Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2987 | 2026-01-14T21:22:50.660Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2988 | 2026-01-14T21:22:50.661Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2989 | 2026-01-14T21:22:50.676Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 2990 | 2026-01-14T21:22:50.683Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Fleet
result = Ok(())
|
| 2991 | 2026-01-14T21:22:50.683Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 2992 | 2026-01-14T21:22:50.683Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 2993 | 2026-01-14T21:22:50.684Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 2994 | 2026-01-14T21:22:50.705Z | TRAC | test_vpc_firewall (InternalApi): fetched allowlist from DB
allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-14T19:25:04.038956Z, time_modified: 2026-01-14T21:22:47.898693Z, allowed_ips: None }
|
| 2995 | 2026-01-14T21:22:50.705Z | DEBG | test_vpc_firewall (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
|
| 2996 | 2026-01-14T21:22:50.705Z | DEBG | test_vpc_firewall (InternalApi): resolved firewall rules for sled agents
sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
|
| 2997 | 2026-01-14T21:22:50.705Z | DEBG | test_vpc_firewall (InternalApi): resolved 3 rules for sleds
|
| 2998 | 2026-01-14T21:22:50.733Z | DEBG | test_vpc_firewall (InternalApi): resolved sleds for vpc oxide-services
vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-01-14T21:22:38.887398Z, time_modified: 2026-01-14T21:22:38.887398Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(60096), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(52160), cpu_family: AmdMilan }]
|
| 2999 | 2026-01-14T21:22:50.733Z | DEBG | test_vpc_firewall (InternalApi): sending firewall rules to sled agents
|
| 3000 | 2026-01-14T21:22:50.820Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 3001 | 2026-01-14T21:22:50.820Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 3002 | 2026-01-14T21:22:50.821Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3003 | 2026-01-14T21:22:50.829Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
|
| 3004 | 2026-01-14T21:22:50.830Z | TRAC | test_vpc_firewall (InternalApi): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3005 | 2026-01-14T21:22:50.830Z | TRAC | test_vpc_firewall (InternalApi): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
|
| 3006 | 2026-01-14T21:22:50.830Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {} }
|
| 3007 | 2026-01-14T21:22:50.830Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3008 | 2026-01-14T21:22:50.840Z | DEBG | test_vpc_firewall (InternalApi): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3009 | 2026-01-14T21:22:50.855Z | DEBG | test_vpc_firewall (InternalApi): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
result = Ok(())
|
| 3010 | 2026-01-14T21:22:50.855Z | DEBG | test_vpc_firewall (InternalApi): client request
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
body = Some(Body)
method = PUT
uri = http://[::1]:60096/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 3011 | 2026-01-14T21:22:50.858Z | INFO | test_vpc_firewall (dropshot): accepted connection
local_addr = [::1]:60096
remote_addr = [::1]:51831
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
|
| 3012 | 2026-01-14T21:22:50.859Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:51831
req_id = ddd63950-1fb6-4b74-8611-7edbfb69ae83
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 3013 | 2026-01-14T21:22:50.859Z | DEBG | test_vpc_firewall (dropshot): determined request API version
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:51831
req_id = ddd63950-1fb6-4b74-8611-7edbfb69ae83
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
version = 12.0.0
|
| 3014 | 2026-01-14T21:22:50.862Z | INFO | test_vpc_firewall (dropshot): request completed
latency_us = 2984
local_addr = [::1]:60096
method = PUT
remote_addr = [::1]:51831
req_id = ddd63950-1fb6-4b74-8611-7edbfb69ae83
response_code = 204
sled_id = b6d65341-167c-41df-9b5c-41cded99c229
uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
|
| 3015 | 2026-01-14T21:22:50.863Z | DEBG | test_vpc_firewall (InternalApi): client response
SledAgent = b6d65341-167c-41df-9b5c-41cded99c229
result = Ok(Response { url: "http://[::1]:60096/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "ddd63950-1fb6-4b74-8611-7edbfb69ae83", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
|
| 3016 | 2026-01-14T21:22:50.867Z | INFO | test_vpc_firewall (InternalApi): updated firewall rules on 1 sleds
|
| 3017 | 2026-01-14T21:22:50.867Z | INFO | test_vpc_firewall (nexus): plumbed initial IP allowlist
|
| 3018 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /
versions = all
|
| 3019 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /access
versions = all
|
| 3020 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /assets/{path}
versions = all
|
| 3021 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /device/auth
versions = all
|
| 3022 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /device/confirm
versions = all
|
| 3023 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /device/success
versions = all
|
| 3024 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /device/token
versions = all
|
| 3025 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /device/verify
versions = all
|
| 3026 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /experimental/v1/probes
versions = all
|
| 3027 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /experimental/v1/probes
versions = all
|
| 3028 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /experimental/v1/probes/{probe}
versions = all
|
| 3029 | 2026-01-14T21:22:50.976Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /experimental/v1/probes/{probe}
versions = all
|
| 3030 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 3031 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 3032 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3033 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3034 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3035 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 3036 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 3037 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 3038 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 3039 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 3040 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /images
versions = all
|
| 3041 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /login
versions = all
|
| 3042 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /login/{silo_name}/local
versions = all
|
| 3043 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 3044 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 3045 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
versions = all
|
| 3046 | 2026-01-14T21:22:50.977Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /lookup/{path}
versions = all
|
| 3047 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /projects/{path}
versions = all
|
| 3048 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /projects-new
versions = all
|
| 3049 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /scim/v2/Groups
versions = all
|
| 3050 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /scim/v2/Groups
versions = all
|
| 3051 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3052 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3053 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PATCH
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3054 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3055 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /scim/v2/Users
versions = all
|
| 3056 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /scim/v2/Users
versions = all
|
| 3057 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /scim/v2/Users/{user_id}
versions = all
|
| 3058 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /scim/v2/Users/{user_id}
versions = all
|
| 3059 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PATCH
path = /scim/v2/Users/{user_id}
versions = all
|
| 3060 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /scim/v2/Users/{user_id}
versions = all
|
| 3061 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /settings/{path}
versions = all
|
| 3062 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /system/{path}
versions = all
|
| 3063 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /utilization
versions = all
|
| 3064 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/affinity-groups
versions = all
|
| 3065 | 2026-01-14T21:22:50.978Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/affinity-groups
versions = all
|
| 3066 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3067 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3068 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3069 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/affinity-groups/{affinity_group}/members
versions = all
|
| 3070 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3071 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3072 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3073 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/alert-classes
versions = all
|
| 3074 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/alert-receivers
versions = all
|
| 3075 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/alert-receivers/{receiver}
versions = all
|
| 3076 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/alert-receivers/{receiver}
versions = all
|
| 3077 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/alert-receivers/{receiver}/deliveries
versions = all
|
| 3078 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/alert-receivers/{receiver}/probe
versions = all
|
| 3079 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/alert-receivers/{receiver}/subscriptions
versions = all
|
| 3080 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/alert-receivers/{receiver}/subscriptions/{subscription}
versions = all
|
| 3081 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/alerts/{alert_id}/resend
versions = all
|
| 3082 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/anti-affinity-groups
versions = all
|
| 3083 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/anti-affinity-groups
versions = all
|
| 3084 | 2026-01-14T21:22:50.979Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3085 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3086 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3087 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members
versions = all
|
| 3088 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3089 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3090 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3091 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/auth-settings
versions = all
|
| 3092 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/auth-settings
versions = all
|
| 3093 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/certificates
versions = all
|
| 3094 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/certificates
versions = all
|
| 3095 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/certificates/{certificate}
versions = all
|
| 3096 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/certificates/{certificate}
versions = all
|
| 3097 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 3098 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/disks
versions = all starting from 2025120300.0.0
|
| 3099 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 3100 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/disks
versions = all starting from 2025120300.0.0
|
| 3101 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/disks/{disk}
versions = all
|
| 3102 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/disks/{disk}
versions = all ending with 2025120300.0.0
|
| 3103 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/disks/{disk}
versions = all starting from 2025120300.0.0
|
| 3104 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/disks/{disk}/bulk-write
versions = all
|
| 3105 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/disks/{disk}/bulk-write-start
versions = all
|
| 3106 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/disks/{disk}/bulk-write-stop
versions = all
|
| 3107 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/disks/{disk}/finalize
versions = all
|
| 3108 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/floating-ips
versions = all
|
| 3109 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/floating-ips
versions = all
|
| 3110 | 2026-01-14T21:22:50.980Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3111 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3112 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3113 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/floating-ips/{floating_ip}/attach
versions = all
|
| 3114 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/floating-ips/{floating_ip}/detach
versions = all
|
| 3115 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/groups
versions = all
|
| 3116 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/groups/{group_id}
versions = all
|
| 3117 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/images
versions = all
|
| 3118 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/images
versions = all
|
| 3119 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/images/{image}
versions = all
|
| 3120 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/images/{image}
versions = all
|
| 3121 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/images/{image}/demote
versions = all
|
| 3122 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/images/{image}/promote
versions = all
|
| 3123 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances
versions = all
|
| 3124 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances
versions = all ending with 2025120300.0.0
|
| 3125 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances
versions = all starting from 2025120300.0.0
|
| 3126 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/instances/{instance}
versions = all
|
| 3127 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}
versions = all
|
| 3128 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/instances/{instance}
versions = all
|
| 3129 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/affinity-groups
versions = all
|
| 3130 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/anti-affinity-groups
versions = all
|
| 3131 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/disks
versions = all ending with 2025120300.0.0
|
| 3132 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/disks
versions = all starting from 2025120300.0.0
|
| 3133 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all ending with 2025120300.0.0
|
| 3134 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all starting from 2025120300.0.0
|
| 3135 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all ending with 2025120300.0.0
|
| 3136 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all starting from 2025120300.0.0
|
| 3137 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/external-ips
versions = all
|
| 3138 | 2026-01-14T21:22:50.981Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
| 3139 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
| 3140 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all
|
| 3141 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all
|
| 3142 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all
|
| 3143 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances/{instance}/reboot
versions = all
|
| 3144 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/serial-console
versions = all
|
| 3145 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/serial-console/stream
versions = all
|
| 3146 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/instances/{instance}/ssh-public-keys
versions = all
|
| 3147 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances/{instance}/start
versions = all
|
| 3148 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/instances/{instance}/stop
versions = all
|
| 3149 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 3150 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 3151 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
versions = all
|
| 3152 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/internet-gateway-ip-pools
versions = all
|
| 3153 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/internet-gateway-ip-pools
versions = all
|
| 3154 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
versions = all
|
| 3155 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/internet-gateways
versions = all
|
| 3156 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/internet-gateways
versions = all
|
| 3157 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/internet-gateways/{gateway}
versions = all
|
| 3158 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/internet-gateways/{gateway}
versions = all
|
| 3159 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/ip-pools
versions = all
|
| 3160 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/ip-pools/{pool}
versions = all
|
| 3161 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/login/{silo_name}/local
versions = all
|
| 3162 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/logout
versions = all
|
| 3163 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/me
versions = all
|
| 3164 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/me/access-tokens
versions = all
|
| 3165 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/me/access-tokens/{token_id}
versions = all
|
| 3166 | 2026-01-14T21:22:50.982Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/me/groups
versions = all
|
| 3167 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/me/ssh-keys
versions = all
|
| 3168 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/me/ssh-keys
versions = all
|
| 3169 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 3170 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 3171 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/metrics/{metric_name}
versions = all
|
| 3172 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/multicast-groups
versions = all
|
| 3173 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/multicast-groups
versions = all
|
| 3174 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/multicast-groups/{multicast_group}
versions = all
|
| 3175 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all
|
| 3176 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/multicast-groups/{multicast_group}
versions = all
|
| 3177 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all
|
| 3178 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/multicast-groups/{multicast_group}/members
versions = all
|
| 3179 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/multicast-groups/{multicast_group}/members/{instance}
versions = all
|
| 3180 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/network-interfaces
versions = all
|
| 3181 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/network-interfaces
versions = all
|
| 3182 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/network-interfaces/{interface}
versions = all
|
| 3183 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/network-interfaces/{interface}
versions = all
|
| 3184 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/network-interfaces/{interface}
versions = all
|
| 3185 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/ping
versions = all
|
| 3186 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/policy
versions = all
|
| 3187 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/policy
versions = all
|
| 3188 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/projects
versions = all
|
| 3189 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/projects
versions = all
|
| 3190 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/projects/{project}
versions = all
|
| 3191 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/projects/{project}
versions = all
|
| 3192 | 2026-01-14T21:22:50.983Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/projects/{project}
versions = all
|
| 3193 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/projects/{project}/policy
versions = all
|
| 3194 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/projects/{project}/policy
versions = all
|
| 3195 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/snapshots
versions = all
|
| 3196 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/snapshots
versions = all
|
| 3197 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/snapshots/{snapshot}
versions = all
|
| 3198 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/snapshots/{snapshot}
versions = all
|
| 3199 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/audit-log
versions = all
|
| 3200 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/disks
versions = all
|
| 3201 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/disks/{disk_id}
versions = all
|
| 3202 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors
versions = all
|
| 3203 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/racks
versions = all
|
| 3204 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/racks/{rack_id}
versions = all
|
| 3205 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/sleds
versions = all
|
| 3206 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/hardware/sleds
versions = all
|
| 3207 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/sleds/{sled_id}
versions = all
|
| 3208 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
versions = all
|
| 3209 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
versions = all
|
| 3210 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
versions = all
|
| 3211 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/sleds-uninitialized
versions = all
|
| 3212 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/switch-port
versions = all
|
| 3213 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 3214 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 3215 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 3216 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 3217 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/switch-port/{port}/status
versions = all
|
| 3218 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/switches
versions = all
|
| 3219 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/hardware/switches/{switch_id}
versions = all
|
| 3220 | 2026-01-14T21:22:50.984Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/identity-providers
versions = all
|
| 3221 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/identity-providers/local/users
versions = all
|
| 3222 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
versions = all
|
| 3223 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
versions = all
|
| 3224 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/identity-providers/saml
versions = all
|
| 3225 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/identity-providers/saml/{provider}
versions = all
|
| 3226 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/ip-pools
versions = all
|
| 3227 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/ip-pools
versions = all
|
| 3228 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3229 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3230 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3231 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all
|
| 3232 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all
|
| 3233 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all
|
| 3234 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
| 3235 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
| 3236 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
| 3237 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
| 3238 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all
|
| 3239 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/ip-pools-service
versions = all
|
| 3240 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all
|
| 3241 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all
|
| 3242 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all
|
| 3243 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/metrics/{metric_name}
versions = all
|
| 3244 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/multicast-groups/by-ip/{address}
versions = all
|
| 3245 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/address-lot
versions = all
|
| 3246 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/networking/address-lot
versions = all
|
| 3247 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 3248 | 2026-01-14T21:22:50.985Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 3249 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
versions = all
|
| 3250 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/allow-list
versions = all
|
| 3251 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/networking/allow-list
versions = all
|
| 3252 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/networking/bfd-disable
versions = all
|
| 3253 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/networking/bfd-enable
versions = all
|
| 3254 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bfd-status
versions = all
|
| 3255 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/networking/bgp
versions = all
|
| 3256 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bgp
versions = all
|
| 3257 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/networking/bgp
versions = all
|
| 3258 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 3259 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 3260 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
versions = all
|
| 3261 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
versions = all
|
| 3262 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bgp-exported
versions = all
|
| 3263 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bgp-message-history
versions = all
|
| 3264 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bgp-routes-ipv4
versions = all
|
| 3265 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bgp-status
versions = all ending with 2025121200.0.0
|
| 3266 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/bgp-status
versions = all starting from 2025121200.0.0
|
| 3267 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/inbound-icmp
versions = all
|
| 3268 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/networking/inbound-icmp
versions = all
|
| 3269 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/loopback-address
versions = all
|
| 3270 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/networking/loopback-address
versions = all
|
| 3271 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
versions = all
|
| 3272 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3273 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3274 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3275 | 2026-01-14T21:22:50.986Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all
|
| 3276 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/policy
versions = all
|
| 3277 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/policy
versions = all
|
| 3278 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/scim/tokens
versions = all
|
| 3279 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/scim/tokens
versions = all
|
| 3280 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 3281 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 3282 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/silo-quotas
versions = all
|
| 3283 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/silos
versions = all
|
| 3284 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/silos
versions = all
|
| 3285 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/silos/{silo}
versions = all
|
| 3286 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/silos/{silo}
versions = all
|
| 3287 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all
|
| 3288 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/silos/{silo}/policy
versions = all
|
| 3289 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/silos/{silo}/policy
versions = all
|
| 3290 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 3291 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 3292 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/timeseries/query
versions = all
|
| 3293 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/timeseries/schemas
versions = all
|
| 3294 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/update/repositories
versions = all
|
| 3295 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/update/repositories
versions = all
|
| 3296 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/update/repositories/{system_version}
versions = all
|
| 3297 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/update/status
versions = all
|
| 3298 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/system/update/target-release
versions = all
|
| 3299 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/update/trust-roots
versions = all
|
| 3300 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/system/update/trust-roots
versions = all
|
| 3301 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 3302 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 3303 | 2026-01-14T21:22:50.987Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/users
versions = all
|
| 3304 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/users/{user_id}
versions = all
|
| 3305 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/users-builtin
versions = all
|
| 3306 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/users-builtin/{user}
versions = all
|
| 3307 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/utilization/silos
versions = all
|
| 3308 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/system/utilization/silos/{silo}
versions = all
|
| 3309 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/timeseries/query
versions = all
|
| 3310 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/users
versions = all
|
| 3311 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/users/{user_id}
versions = all
|
| 3312 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/users/{user_id}/access-tokens
versions = all
|
| 3313 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/users/{user_id}/logout
versions = all
|
| 3314 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/users/{user_id}/sessions
versions = all
|
| 3315 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/utilization
versions = all
|
| 3316 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpc-firewall-rules
versions = all
|
| 3317 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/vpc-firewall-rules
versions = all
|
| 3318 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpc-router-routes
versions = all
|
| 3319 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/vpc-router-routes
versions = all
|
| 3320 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3321 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3322 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3323 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpc-routers
versions = all
|
| 3324 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/vpc-routers
versions = all
|
| 3325 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/vpc-routers/{router}
versions = all
|
| 3326 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpc-routers/{router}
versions = all
|
| 3327 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/vpc-routers/{router}
versions = all
|
| 3328 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpc-subnets
versions = all
|
| 3329 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/vpc-subnets
versions = all
|
| 3330 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3331 | 2026-01-14T21:22:50.988Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3332 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3333 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all
|
| 3334 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpcs
versions = all
|
| 3335 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/vpcs
versions = all
|
| 3336 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/vpcs/{vpc}
versions = all
|
| 3337 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/vpcs/{vpc}
versions = all
|
| 3338 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/vpcs/{vpc}
versions = all
|
| 3339 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/webhook-receivers
versions = all
|
| 3340 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = PUT
path = /v1/webhook-receivers/{receiver}
versions = all
|
| 3341 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = GET
path = /v1/webhook-secrets
versions = all
|
| 3342 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = POST
path = /v1/webhook-secrets
versions = all
|
| 3343 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): registered endpoint
local_addr = 127.0.0.1:43638
method = DELETE
path = /v1/webhook-secrets/{secret_id}
versions = all
|
| 3344 | 2026-01-14T21:22:50.989Z | INFO | test_vpc_firewall (dropshot_external): listening
local_addr = 127.0.0.1:43638
|
| 3345 | 2026-01-14T21:22:50.989Z | DEBG | test_vpc_firewall (dropshot_external): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:43638
|
| 3346 | 2026-01-14T21:22:51.086Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /
versions = all
|
| 3347 | 2026-01-14T21:22:51.086Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /access
versions = all
|
| 3348 | 2026-01-14T21:22:51.086Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /assets/{path}
versions = all
|
| 3349 | 2026-01-14T21:22:51.086Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /device/auth
versions = all
|
| 3350 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /device/confirm
versions = all
|
| 3351 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /device/success
versions = all
|
| 3352 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /device/token
versions = all
|
| 3353 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /device/verify
versions = all
|
| 3354 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /experimental/v1/probes
versions = all
|
| 3355 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /experimental/v1/probes
versions = all
|
| 3356 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /experimental/v1/probes/{probe}
versions = all
|
| 3357 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /experimental/v1/probes/{probe}
versions = all
|
| 3358 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /experimental/v1/system/support-bundles
versions = all
|
| 3359 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /experimental/v1/system/support-bundles
versions = all
|
| 3360 | 2026-01-14T21:22:51.087Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3361 | 2026-01-14T21:22:51.088Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3362 | 2026-01-14T21:22:51.088Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /experimental/v1/system/support-bundles/{bundle_id}
versions = all
|
| 3363 | 2026-01-14T21:22:51.088Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 3364 | 2026-01-14T21:22:51.088Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download
versions = all
|
| 3365 | 2026-01-14T21:22:51.088Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 3366 | 2026-01-14T21:22:51.090Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = HEAD
path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file}
versions = all
|
| 3367 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /experimental/v1/system/support-bundles/{bundle_id}/index
versions = all
|
| 3368 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /images
versions = all
|
| 3369 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /login
versions = all
|
| 3370 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /login/{silo_name}/local
versions = all
|
| 3371 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 3372 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /login/{silo_name}/saml/{provider_name}
versions = all
|
| 3373 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /login/{silo_name}/saml/{provider_name}/redirect
versions = all
|
| 3374 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /lookup/{path}
versions = all
|
| 3375 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /projects/{path}
versions = all
|
| 3376 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /projects-new
versions = all
|
| 3377 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /scim/v2/Groups
versions = all
|
| 3378 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /scim/v2/Groups
versions = all
|
| 3379 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3380 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3381 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PATCH
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3382 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /scim/v2/Groups/{group_id}
versions = all
|
| 3383 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /scim/v2/Users
versions = all
|
| 3384 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /scim/v2/Users
versions = all
|
| 3385 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /scim/v2/Users/{user_id}
versions = all
|
| 3386 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /scim/v2/Users/{user_id}
versions = all
|
| 3387 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PATCH
path = /scim/v2/Users/{user_id}
versions = all
|
| 3388 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /scim/v2/Users/{user_id}
versions = all
|
| 3389 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /settings/{path}
versions = all
|
| 3390 | 2026-01-14T21:22:51.091Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /system/{path}
versions = all
|
| 3391 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /utilization
versions = all
|
| 3392 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/affinity-groups
versions = all
|
| 3393 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/affinity-groups
versions = all
|
| 3394 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3395 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3396 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/affinity-groups/{affinity_group}
versions = all
|
| 3397 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/affinity-groups/{affinity_group}/members
versions = all
|
| 3398 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3399 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3400 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/affinity-groups/{affinity_group}/members/instance/{instance}
versions = all
|
| 3401 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/alert-classes
versions = all
|
| 3402 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/alert-receivers
versions = all
|
| 3403 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/alert-receivers/{receiver}
versions = all
|
| 3404 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/alert-receivers/{receiver}
versions = all
|
| 3405 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/alert-receivers/{receiver}/deliveries
versions = all
|
| 3406 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/alert-receivers/{receiver}/probe
versions = all
|
| 3407 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/alert-receivers/{receiver}/subscriptions
versions = all
|
| 3408 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/alert-receivers/{receiver}/subscriptions/{subscription}
versions = all
|
| 3409 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/alerts/{alert_id}/resend
versions = all
|
| 3410 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/anti-affinity-groups
versions = all
|
| 3411 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/anti-affinity-groups
versions = all
|
| 3412 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3413 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3414 | 2026-01-14T21:22:51.092Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/anti-affinity-groups/{anti_affinity_group}
versions = all
|
| 3415 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members
versions = all
|
| 3416 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3417 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3418 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance}
versions = all
|
| 3419 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/auth-settings
versions = all
|
| 3420 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/auth-settings
versions = all
|
| 3421 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/certificates
versions = all
|
| 3422 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/certificates
versions = all
|
| 3423 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/certificates/{certificate}
versions = all
|
| 3424 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/certificates/{certificate}
versions = all
|
| 3425 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 3426 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/disks
versions = all starting from 2025120300.0.0
|
| 3427 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/disks
versions = all ending with 2025120300.0.0
|
| 3428 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/disks
versions = all starting from 2025120300.0.0
|
| 3429 | 2026-01-14T21:22:51.093Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/disks/{disk}
versions = all
|
| 3430 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/disks/{disk}
versions = all ending with 2025120300.0.0
|
| 3431 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/disks/{disk}
versions = all starting from 2025120300.0.0
|
| 3432 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/disks/{disk}/bulk-write
versions = all
|
| 3433 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/disks/{disk}/bulk-write-start
versions = all
|
| 3434 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/disks/{disk}/bulk-write-stop
versions = all
|
| 3435 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/disks/{disk}/finalize
versions = all
|
| 3436 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/floating-ips
versions = all
|
| 3437 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/floating-ips
versions = all
|
| 3438 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3439 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3440 | 2026-01-14T21:22:51.094Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/floating-ips/{floating_ip}
versions = all
|
| 3441 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/floating-ips/{floating_ip}/attach
versions = all
|
| 3442 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/floating-ips/{floating_ip}/detach
versions = all
|
| 3443 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/groups
versions = all
|
| 3444 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/groups/{group_id}
versions = all
|
| 3445 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/images
versions = all
|
| 3446 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/images
versions = all
|
| 3447 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/images/{image}
versions = all
|
| 3448 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/images/{image}
versions = all
|
| 3449 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/images/{image}/demote
versions = all
|
| 3450 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/images/{image}/promote
versions = all
|
| 3451 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances
versions = all
|
| 3452 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances
versions = all ending with 2025120300.0.0
|
| 3453 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances
versions = all starting from 2025120300.0.0
|
| 3454 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/instances/{instance}
versions = all
|
| 3455 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}
versions = all
|
| 3456 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/instances/{instance}
versions = all
|
| 3457 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/affinity-groups
versions = all
|
| 3458 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/anti-affinity-groups
versions = all
|
| 3459 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/disks
versions = all ending with 2025120300.0.0
|
| 3460 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/disks
versions = all starting from 2025120300.0.0
|
| 3461 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all ending with 2025120300.0.0
|
| 3462 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances/{instance}/disks/attach
versions = all starting from 2025120300.0.0
|
| 3463 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all ending with 2025120300.0.0
|
| 3464 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances/{instance}/disks/detach
versions = all starting from 2025120300.0.0
|
| 3465 | 2026-01-14T21:22:51.095Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/external-ips
versions = all
|
| 3466 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
| 3467 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances/{instance}/external-ips/ephemeral
versions = all
|
| 3468 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/multicast-groups
versions = all
|
| 3469 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all
|
| 3470 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/instances/{instance}/multicast-groups/{multicast_group}
versions = all
|
| 3471 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances/{instance}/reboot
versions = all
|
| 3472 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/serial-console
versions = all
|
| 3473 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/serial-console/stream
versions = all
|
| 3474 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/instances/{instance}/ssh-public-keys
versions = all
|
| 3475 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances/{instance}/start
versions = all
|
| 3476 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/instances/{instance}/stop
versions = all
|
| 3477 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 3478 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/internet-gateway-ip-addresses
versions = all
|
| 3479 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/internet-gateway-ip-addresses/{address}
versions = all
|
| 3480 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/internet-gateway-ip-pools
versions = all
|
| 3481 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/internet-gateway-ip-pools
versions = all
|
| 3482 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/internet-gateway-ip-pools/{pool}
versions = all
|
| 3483 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/internet-gateways
versions = all
|
| 3484 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/internet-gateways
versions = all
|
| 3485 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/internet-gateways/{gateway}
versions = all
|
| 3486 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/internet-gateways/{gateway}
versions = all
|
| 3487 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/ip-pools
versions = all
|
| 3488 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/ip-pools/{pool}
versions = all
|
| 3489 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/login/{silo_name}/local
versions = all
|
| 3490 | 2026-01-14T21:22:51.096Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/logout
versions = all
|
| 3491 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/me
versions = all
|
| 3492 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/me/access-tokens
versions = all
|
| 3493 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/me/access-tokens/{token_id}
versions = all
|
| 3494 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/me/groups
versions = all
|
| 3495 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/me/ssh-keys
versions = all
|
| 3496 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/me/ssh-keys
versions = all
|
| 3497 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 3498 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/me/ssh-keys/{ssh_key}
versions = all
|
| 3499 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/metrics/{metric_name}
versions = all
|
| 3500 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/multicast-groups
versions = all
|
| 3501 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/multicast-groups
versions = all
|
| 3502 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/multicast-groups/{multicast_group}
versions = all
|
| 3503 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/multicast-groups/{multicast_group}
versions = all
|
| 3504 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/multicast-groups/{multicast_group}
versions = all
|
| 3505 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/multicast-groups/{multicast_group}/members
versions = all
|
| 3506 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/multicast-groups/{multicast_group}/members
versions = all
|
| 3507 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/multicast-groups/{multicast_group}/members/{instance}
versions = all
|
| 3508 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/network-interfaces
versions = all
|
| 3509 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/network-interfaces
versions = all
|
| 3510 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/network-interfaces/{interface}
versions = all
|
| 3511 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/network-interfaces/{interface}
versions = all
|
| 3512 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/network-interfaces/{interface}
versions = all
|
| 3513 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/ping
versions = all
|
| 3514 | 2026-01-14T21:22:51.097Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/policy
versions = all
|
| 3515 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/policy
versions = all
|
| 3516 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/projects
versions = all
|
| 3517 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/projects
versions = all
|
| 3518 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/projects/{project}
versions = all
|
| 3519 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/projects/{project}
versions = all
|
| 3520 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/projects/{project}
versions = all
|
| 3521 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/projects/{project}/policy
versions = all
|
| 3522 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/projects/{project}/policy
versions = all
|
| 3523 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/snapshots
versions = all
|
| 3524 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/snapshots
versions = all
|
| 3525 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/snapshots/{snapshot}
versions = all
|
| 3526 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/snapshots/{snapshot}
versions = all
|
| 3527 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/audit-log
versions = all
|
| 3528 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/disks
versions = all
|
| 3529 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/disks/{disk_id}
versions = all
|
| 3530 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors
versions = all
|
| 3531 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/racks
versions = all
|
| 3532 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/racks/{rack_id}
versions = all
|
| 3533 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/sleds
versions = all
|
| 3534 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/hardware/sleds
versions = all
|
| 3535 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/sleds/{sled_id}
versions = all
|
| 3536 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/sleds/{sled_id}/disks
versions = all
|
| 3537 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/sleds/{sled_id}/instances
versions = all
|
| 3538 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/hardware/sleds/{sled_id}/provision-policy
versions = all
|
| 3539 | 2026-01-14T21:22:51.098Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/sleds-uninitialized
versions = all
|
| 3540 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/switch-port
versions = all
|
| 3541 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 3542 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/hardware/switch-port/{port}/lldp/config
versions = all
|
| 3543 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 3544 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/hardware/switch-port/{port}/settings
versions = all
|
| 3545 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/switch-port/{port}/status
versions = all
|
| 3546 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/switches
versions = all
|
| 3547 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/hardware/switches/{switch_id}
versions = all
|
| 3548 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/identity-providers
versions = all
|
| 3549 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/identity-providers/local/users
versions = all
|
| 3550 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/identity-providers/local/users/{user_id}
versions = all
|
| 3551 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/identity-providers/local/users/{user_id}/set-password
versions = all
|
| 3552 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/identity-providers/saml
versions = all
|
| 3553 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/identity-providers/saml/{provider}
versions = all
|
| 3554 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/ip-pools
versions = all
|
| 3555 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/ip-pools
versions = all
|
| 3556 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3557 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3558 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/ip-pools/{pool}
versions = all
|
| 3559 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/ip-pools/{pool}/ranges
versions = all
|
| 3560 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/ip-pools/{pool}/ranges/add
versions = all
|
| 3561 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/ip-pools/{pool}/ranges/remove
versions = all
|
| 3562 | 2026-01-14T21:22:51.099Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
| 3563 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/ip-pools/{pool}/silos
versions = all
|
| 3564 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
| 3565 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/ip-pools/{pool}/silos/{silo}
versions = all
|
| 3566 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/ip-pools/{pool}/utilization
versions = all
|
| 3567 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/ip-pools-service
versions = all
|
| 3568 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/ip-pools-service/ranges
versions = all
|
| 3569 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/ip-pools-service/ranges/add
versions = all
|
| 3570 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/ip-pools-service/ranges/remove
versions = all
|
| 3571 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/metrics/{metric_name}
versions = all
|
| 3572 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/multicast-groups/by-ip/{address}
versions = all
|
| 3573 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/address-lot
versions = all
|
| 3574 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/networking/address-lot
versions = all
|
| 3575 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 3576 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/address-lot/{address_lot}
versions = all
|
| 3577 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/address-lot/{address_lot}/blocks
versions = all
|
| 3578 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/allow-list
versions = all
|
| 3579 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/networking/allow-list
versions = all
|
| 3580 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/networking/bfd-disable
versions = all
|
| 3581 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/networking/bfd-enable
versions = all
|
| 3582 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bfd-status
versions = all
|
| 3583 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/networking/bgp
versions = all
|
| 3584 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bgp
versions = all
|
| 3585 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/networking/bgp
versions = all
|
| 3586 | 2026-01-14T21:22:51.100Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 3587 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/networking/bgp-announce-set
versions = all
|
| 3588 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/networking/bgp-announce-set/{announce_set}
versions = all
|
| 3589 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement
versions = all
|
| 3590 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bgp-exported
versions = all
|
| 3591 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bgp-message-history
versions = all
|
| 3592 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bgp-routes-ipv4
versions = all
|
| 3593 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bgp-status
versions = all ending with 2025121200.0.0
|
| 3594 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/bgp-status
versions = all starting from 2025121200.0.0
|
| 3595 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/inbound-icmp
versions = all
|
| 3596 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/networking/inbound-icmp
versions = all
|
| 3597 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/loopback-address
versions = all
|
| 3598 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/networking/loopback-address
versions = all
|
| 3599 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask}
versions = all
|
| 3600 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3601 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3602 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/networking/switch-port-settings
versions = all
|
| 3603 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/networking/switch-port-settings/{port}
versions = all
|
| 3604 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/policy
versions = all
|
| 3605 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/policy
versions = all
|
| 3606 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/scim/tokens
versions = all
|
| 3607 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/scim/tokens
versions = all
|
| 3608 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 3609 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/scim/tokens/{token_id}
versions = all
|
| 3610 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/silo-quotas
versions = all
|
| 3611 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/silos
versions = all
|
| 3612 | 2026-01-14T21:22:51.101Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/silos
versions = all
|
| 3613 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/silos/{silo}
versions = all
|
| 3614 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/silos/{silo}
versions = all
|
| 3615 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/silos/{silo}/ip-pools
versions = all
|
| 3616 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/silos/{silo}/policy
versions = all
|
| 3617 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/silos/{silo}/policy
versions = all
|
| 3618 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 3619 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/silos/{silo}/quotas
versions = all
|
| 3620 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/timeseries/query
versions = all
|
| 3621 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/timeseries/schemas
versions = all
|
| 3622 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/update/repositories
versions = all
|
| 3623 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/update/repositories
versions = all
|
| 3624 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/update/repositories/{system_version}
versions = all
|
| 3625 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/update/status
versions = all
|
| 3626 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/system/update/target-release
versions = all
|
| 3627 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/update/trust-roots
versions = all
|
| 3628 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/system/update/trust-roots
versions = all
|
| 3629 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 3630 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/update/trust-roots/{trust_root_id}
versions = all
|
| 3631 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/users
versions = all
|
| 3632 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/users/{user_id}
versions = all
|
| 3633 | 2026-01-14T21:22:51.102Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/users-builtin
versions = all
|
| 3634 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/users-builtin/{user}
versions = all
|
| 3635 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/utilization/silos
versions = all
|
| 3636 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/system/utilization/silos/{silo}
versions = all
|
| 3637 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/timeseries/query
versions = all
|
| 3638 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/users
versions = all
|
| 3639 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/users/{user_id}
versions = all
|
| 3640 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/users/{user_id}/access-tokens
versions = all
|
| 3641 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/users/{user_id}/logout
versions = all
|
| 3642 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/users/{user_id}/sessions
versions = all
|
| 3643 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/utilization
versions = all
|
| 3644 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpc-firewall-rules
versions = all
|
| 3645 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/vpc-firewall-rules
versions = all
|
| 3646 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpc-router-routes
versions = all
|
| 3647 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/vpc-router-routes
versions = all
|
| 3648 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3649 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3650 | 2026-01-14T21:22:51.103Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/vpc-router-routes/{route}
versions = all
|
| 3651 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpc-routers
versions = all
|
| 3652 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/vpc-routers
versions = all
|
| 3653 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/vpc-routers/{router}
versions = all
|
| 3654 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpc-routers/{router}
versions = all
|
| 3655 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/vpc-routers/{router}
versions = all
|
| 3656 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpc-subnets
versions = all
|
| 3657 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/vpc-subnets
versions = all
|
| 3658 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3659 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3660 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/vpc-subnets/{subnet}
versions = all
|
| 3661 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpc-subnets/{subnet}/network-interfaces
versions = all
|
| 3662 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpcs
versions = all
|
| 3663 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/vpcs
versions = all
|
| 3664 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/vpcs/{vpc}
versions = all
|
| 3665 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/vpcs/{vpc}
versions = all
|
| 3666 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/vpcs/{vpc}
versions = all
|
| 3667 | 2026-01-14T21:22:51.104Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/webhook-receivers
versions = all
|
| 3668 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = PUT
path = /v1/webhook-receivers/{receiver}
versions = all
|
| 3669 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = GET
path = /v1/webhook-secrets
versions = all
|
| 3670 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = POST
path = /v1/webhook-secrets
versions = all
|
| 3671 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (dropshot_external_techport): registered endpoint
local_addr = 127.0.0.1:62502
method = DELETE
path = /v1/webhook-secrets/{secret_id}
versions = all
|
| 3672 | 2026-01-14T21:22:51.105Z | INFO | test_vpc_firewall (dropshot_external_techport): listening
local_addr = 127.0.0.1:62502
|
| 3673 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (dropshot_external_techport): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:62502
|
| 3674 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (nexus-producer-server): registered DTrace probes
|
| 3675 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = 127.0.0.1:47995
method = GET
path = /{producer_id}
versions = all
|
| 3676 | 2026-01-14T21:22:51.105Z | INFO | test_vpc_firewall (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328
local_addr = 127.0.0.1:47995
|
| 3677 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (dropshot): successfully registered DTrace USDT probes
local_addr = 127.0.0.1:47995
|
| 3678 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:47995
|
| 3679 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (nexus-producer-server): Nexus IP provided explicitly, will use it
addr = 127.0.0.1:45286
|
| 3680 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (nexus-producer-server): starting producer registration task
|
| 3681 | 2026-01-14T21:22:51.105Z | INFO | test_vpc_firewall (nexus-producer-server): starting oximeter metric producer server
address = 127.0.0.1:47995
file = oximeter/producer/src/lib.rs:279
interval = 10s
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3682 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_oximeter
|
| 3683 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall: Starting Oximeter
|
| 3684 | 2026-01-14T21:22:51.105Z | DEBG | test_vpc_firewall (oximeter): registered DTrace probes
|
| 3685 | 2026-01-14T21:22:51.105Z | INFO | test_vpc_firewall (oximeter): starting oximeter server
file = oximeter/collector/src/lib.rs:264
|
| 3686 | 2026-01-14T21:22:51.106Z | DEBG | test_vpc_firewall (oximeter): creating ClickHouse client
|
| 3687 | 2026-01-14T21:22:51.106Z | DEBG | test_vpc_firewall (clickhouse-client): registered USDT probes
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 3688 | 2026-01-14T21:22:51.107Z | DEBG | test_vpc_firewall (producer-registration-task): registering as oximeter producer with Nexus
registration_count = 0
|
| 3689 | 2026-01-14T21:22:51.107Z | DEBG | test_vpc_firewall (producer-registration-task): will register with Nexus at 127.0.0.1:45286
|
| 3690 | 2026-01-14T21:22:51.202Z | DEBG | test_vpc_firewall (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:45286/metrics/producers
|
| 3691 | 2026-01-14T21:22:51.204Z | INFO | test_vpc_firewall (dropshot_internal): accepted connection
local_addr = 127.0.0.1:45286
remote_addr = 127.0.0.1:35787
|
| 3692 | 2026-01-14T21:22:51.208Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:35787
req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9
uri = /metrics/producers
|
| 3693 | 2026-01-14T21:22:51.209Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:35787
req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9
uri = /metrics/producers
version = 1.0.0
|
| 3694 | 2026-01-14T21:22:51.211Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:35787
req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3695 | 2026-01-14T21:22:51.211Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:35787
req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3696 | 2026-01-14T21:22:51.214Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:35787
req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3697 | 2026-01-14T21:22:51.219Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = SELECT MAX(value) AS max_version FROM oximeter.version;
|
| 3698 | 2026-01-14T21:22:51.235Z | WARN | test_vpc_firewall (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:900
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 3699 | 2026-01-14T21:22:51.236Z | DEBG | test_vpc_firewall (oximeter-agent): oximeter database does not exist, creating
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3700 | 2026-01-14T21:22:51.236Z | INFO | test_vpc_firewall (clickhouse-client): reading db version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:800
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 3701 | 2026-01-14T21:22:51.236Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = SELECT MAX(value) AS max_version FROM oximeter.version;
|
| 3702 | 2026-01-14T21:22:51.240Z | WARN | test_vpc_firewall (clickhouse-client): oximeter database does not exist, or is out-of-date
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:900
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 3703 | 2026-01-14T21:22:51.240Z | INFO | test_vpc_firewall (clickhouse-client): read oximeter database version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:805
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
version = 0
|
| 3704 | 2026-01-14T21:22:51.240Z | INFO | test_vpc_firewall (clickhouse-client): initializing oximeter schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:810
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 3705 | 2026-01-14T21:22:51.240Z | DEBG | test_vpc_firewall (clickhouse-client): initializing ClickHouse database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 3706 | 2026-01-14T21:22:51.241Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = CREATE DATABASE IF NOT EXISTS oximeter
|
| 3707 | 2026-01-14T21:22:51.244Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
|
| 3708 | 2026-01-14T21:22:51.248Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3709 | 2026-01-14T21:22:51.252Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3710 | 2026-01-14T21:22:51.255Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3711 | 2026-01-14T21:22:51.258Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3712 | 2026-01-14T21:22:51.262Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3713 | 2026-01-14T21:22:51.269Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3714 | 2026-01-14T21:22:51.273Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3715 | 2026-01-14T21:22:51.283Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3716 | 2026-01-14T21:22:51.291Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3717 | 2026-01-14T21:22:51.300Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3718 | 2026-01-14T21:22:51.310Z | INFO | test_vpc_firewall (dropshot_internal): request completed
error_message_external = Service Unavailable
error_message_internal = no Oximeter instances available for assignment
latency_us = 101466
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:35787
req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9
response_code = 503
uri = /metrics/producers
|
| 3719 | 2026-01-14T21:22:51.310Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3720 | 2026-01-14T21:22:51.311Z | DEBG | test_vpc_firewall (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:45286/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "ca2ec4fa-7915-448e-96aa-04df68d108b9", "content-length": "133", "date": "Wed, 14 Jan 2026 21:22:51 GMT"} })
|
| 3721 | 2026-01-14T21:22:51.315Z | WARN | test_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry
count = 0
delay = 207.465267ms
error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"ca2ec4fa-7915-448e-96aa-04df68d108b9\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 14 Jan 2026 21:22:51 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"ca2ec4fa-7915-448e-96aa-04df68d108b9\\" }"
file = oximeter/producer/src/lib.rs:371
|
| 3722 | 2026-01-14T21:22:51.315Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3723 | 2026-01-14T21:22:51.319Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3724 | 2026-01-14T21:22:51.323Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3725 | 2026-01-14T21:22:51.329Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3726 | 2026-01-14T21:22:51.337Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3727 | 2026-01-14T21:22:51.340Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3728 | 2026-01-14T21:22:51.348Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3729 | 2026-01-14T21:22:51.354Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3730 | 2026-01-14T21:22:51.362Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3731 | 2026-01-14T21:22:51.367Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3732 | 2026-01-14T21:22:51.373Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3733 | 2026-01-14T21:22:51.380Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3734 | 2026-01-14T21:22:51.397Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3735 | 2026-01-14T21:22:51.403Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3736 | 2026-01-14T21:22:51.408Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3737 | 2026-01-14T21:22:51.413Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
|
| 3738 | 2026-01-14T21:22:51.418Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3739 | 2026-01-14T21:22:51.423Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3740 | 2026-01-14T21:22:51.429Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3741 | 2026-01-14T21:22:51.429Z | INFO | test_vpc_firewall (BackgroundTasks): inserted inventory collection
background_task = inventory_collection
collection_id = 6f9d2406-dba2-4825-a5dc-ef88012bdcac
|
| 3742 | 2026-01-14T21:22:51.430Z | DEBG | test_vpc_firewall (BackgroundTasks): inventory collection complete
background_task = inventory_collection
collection_id = 6f9d2406-dba2-4825-a5dc-ef88012bdcac
time_started = 2026-01-14 21:22:49.434380 UTC
|
| 3743 | 2026-01-14T21:22:51.431Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = inventory_collection
elapsed = 2.588209802s
iteration = 3
status = {"collection_id":"6f9d2406-dba2-4825-a5dc-ef88012bdcac","time_done":"2026-01-14 21:22:50.499775 UTC","time_started":"2026-01-14 21:22:49.434380 UTC"}
|
| 3744 | 2026-01-14T21:22:51.431Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 4
reason = Dependency
|
| 3745 | 2026-01-14T21:22:51.431Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 3746 | 2026-01-14T21:22:51.431Z | TRAC | test_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 3747 | 2026-01-14T21:22:51.431Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 3748 | 2026-01-14T21:22:51.432Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = inventory_loader
iteration = 3
reason = Dependency
|
| 3749 | 2026-01-14T21:22:51.432Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
|
| 3750 | 2026-01-14T21:22:51.432Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3751 | 2026-01-14T21:22:51.432Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3752 | 2026-01-14T21:22:51.432Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3753 | 2026-01-14T21:22:51.434Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3754 | 2026-01-14T21:22:51.438Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3755 | 2026-01-14T21:22:51.438Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 88 34 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .4..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:43401
req_id = 904f8398-a76a-4c40-afa4-95f312a09c66
|
| 3756 | 2026-01-14T21:22:51.439Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 34868,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:43401
req_id = 904f8398-a76a-4c40-afa4-95f312a09c66
|
| 3757 | 2026-01-14T21:22:51.439Z | DEBG | test_vpc_firewall (store): query key
key = _dendrite._tcp
|
| 3758 | 2026-01-14T21:22:51.440Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 3759 | 2026-01-14T21:22:51.440Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:43401
query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = 904f8398-a76a-4c40-afa4-95f312a09c66
|
| 3760 | 2026-01-14T21:22:51.440Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3761 | 2026-01-14T21:22:51.450Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
result = Ok(())
|
| 3762 | 2026-01-14T21:22:51.450Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3763 | 2026-01-14T21:22:51.450Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3764 | 2026-01-14T21:22:51.451Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3765 | 2026-01-14T21:22:51.452Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3766 | 2026-01-14T21:22:51.453Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10494, tv_nsec: 839927700 } })
|
| 3767 | 2026-01-14T21:22:51.453Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 3768 | 2026-01-14T21:22:51.453Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: c0 9f 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:17454
req_id = 4a0ae7ce-903c-4c7a-b694-c1803a4bb694
|
| 3769 | 2026-01-14T21:22:51.454Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 49311,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:17454
req_id = 4a0ae7ce-903c-4c7a-b694-c1803a4bb694
|
| 3770 | 2026-01-14T21:22:51.454Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 3771 | 2026-01-14T21:22:51.454Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:17454
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 4a0ae7ce-903c-4c7a-b694-c1803a4bb694
|
| 3772 | 2026-01-14T21:22:51.524Z | TRAC | test_vpc_firewall (DpdClient): client request
background_task = multicast_reconciler
body = None
method = GET
uri = http://[::1]:65194/switch/identifiers
|
| 3773 | 2026-01-14T21:22:51.525Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3774 | 2026-01-14T21:22:51.525Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3775 | 2026-01-14T21:22:51.526Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3776 | 2026-01-14T21:22:51.529Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3777 | 2026-01-14T21:22:51.531Z | TRAC | test_vpc_firewall (DpdClient): client response
background_task = multicast_reconciler
result = Ok(Response { url: "http://[::1]:65194/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "2195ff21-a126-4417-882e-6170e0b78a78", "content-length": "206", "date": "Wed, 14 Jan 2026 21:22:51 GMT"} })
|
| 3778 | 2026-01-14T21:22:51.531Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Creating
|
| 3779 | 2026-01-14T21:22:51.532Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3780 | 2026-01-14T21:22:51.532Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3781 | 2026-01-14T21:22:51.533Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3782 | 2026-01-14T21:22:51.536Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3783 | 2026-01-14T21:22:51.540Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Creating
|
| 3784 | 2026-01-14T21:22:51.540Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Deleting
|
| 3785 | 2026-01-14T21:22:51.540Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3786 | 2026-01-14T21:22:51.540Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3787 | 2026-01-14T21:22:51.541Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3788 | 2026-01-14T21:22:51.545Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3789 | 2026-01-14T21:22:51.550Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Deleting
|
| 3790 | 2026-01-14T21:22:51.550Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Active
|
| 3791 | 2026-01-14T21:22:51.550Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3792 | 2026-01-14T21:22:51.550Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3793 | 2026-01-14T21:22:51.551Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3794 | 2026-01-14T21:22:51.554Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3795 | 2026-01-14T21:22:51.557Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Active
|
| 3796 | 2026-01-14T21:22:51.557Z | TRAC | test_vpc_firewall (BackgroundTasks): reconciling member state changes
background_task = multicast_reconciler
|
| 3797 | 2026-01-14T21:22:51.557Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3798 | 2026-01-14T21:22:51.557Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3799 | 2026-01-14T21:22:51.561Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3800 | 2026-01-14T21:22:51.566Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3801 | 2026-01-14T21:22:51.571Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3802 | 2026-01-14T21:22:51.571Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3803 | 2026-01-14T21:22:51.572Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3804 | 2026-01-14T21:22:51.572Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3805 | 2026-01-14T21:22:51.576Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
|
| 3806 | 2026-01-14T21:22:51.581Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
|
| 3807 | 2026-01-14T21:22:51.582Z | DEBG | test_vpc_firewall (BackgroundTasks): found groups for member reconciliation
background_task = multicast_reconciler
total_groups = 0
|
| 3808 | 2026-01-14T21:22:51.583Z | DEBG | test_vpc_firewall (BackgroundTasks): member state reconciliation completed
background_task = multicast_reconciler
members_processed = 0
|
| 3809 | 2026-01-14T21:22:51.583Z | TRAC | test_vpc_firewall (BackgroundTasks): cleaning up deleted multicast members
background_task = multicast_reconciler
|
| 3810 | 2026-01-14T21:22:51.583Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 3811 | 2026-01-14T21:22:51.583Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 3812 | 2026-01-14T21:22:51.584Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 3813 | 2026-01-14T21:22:51.589Z | DEBG | test_vpc_firewall (BackgroundTasks): multicast group member complete deletion finished
background_task = multicast_reconciler
left_and_time_deleted_members_deleted = 0
|
| 3814 | 2026-01-14T21:22:51.589Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation cycle completed
active_groups_verified = 0
background_task = multicast_reconciler
error_count = 0
external_groups_created = 0
external_groups_deleted = 0
member_lifecycle_transitions = 0
orphaned_member_cleanup = 0
total_dpd_operations = 0
|
| 3815 | 2026-01-14T21:22:51.591Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent
background_task = multicast_reconciler
|
| 3816 | 2026-01-14T21:22:51.591Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 160.00816ms
iteration = 4
status = {"disabled":false,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 3817 | 2026-01-14T21:22:51.592Z | INFO | test_vpc_firewall (clickhouse-client): inserting current version
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/db/src/client/mod.rs:831
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
version = 14
|
| 3818 | 2026-01-14T21:22:51.592Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = INSERT INTO oximeter.version (*) VALUES (14, now());
|
| 3819 | 2026-01-14T21:22:51.605Z | DEBG | test_vpc_firewall (clickhouse-client): registered USDT probes
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = ce5ab9ef-56ec-4606-8eac-f66d90c3bdba
|
| 3820 | 2026-01-14T21:22:51.607Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:43210
method = GET
path = /info
versions = all
|
| 3821 | 2026-01-14T21:22:51.607Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:43210
method = GET
path = /producers
versions = all
|
| 3822 | 2026-01-14T21:22:51.607Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:43210
method = DELETE
path = /producers/{producer_id}
versions = all
|
| 3823 | 2026-01-14T21:22:51.608Z | DEBG | test_vpc_firewall (dropshot): registered endpoint
local_addr = [::1]:43210
method = GET
path = /producers/{producer_id}
versions = all
|
| 3824 | 2026-01-14T21:22:51.608Z | INFO | test_vpc_firewall (dropshot): listening
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328
local_addr = [::1]:43210
|
| 3825 | 2026-01-14T21:22:51.608Z | DEBG | test_vpc_firewall (dropshot): successfully registered DTrace USDT probes
local_addr = [::1]:43210
|
| 3826 | 2026-01-14T21:22:51.610Z | DEBG | test_vpc_firewall (oximeter): registered USDT probes
|
| 3827 | 2026-01-14T21:22:51.610Z | DEBG | test_vpc_firewall (oximeter): contacting nexus
|
| 3828 | 2026-01-14T21:22:52.307Z | DEBG | test_vpc_firewall (oximeter): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:45286/metrics/collectors
|
| 3829 | 2026-01-14T21:22:52.308Z | DEBG | test_vpc_firewall (producer-registration-task): will register with Nexus at 127.0.0.1:45286
|
| 3830 | 2026-01-14T21:22:52.395Z | DEBG | test_vpc_firewall (producer-registration-task): client request
body = Some(Body)
method = POST
uri = http://127.0.0.1:45286/metrics/producers
|
| 3831 | 2026-01-14T21:22:52.400Z | INFO | test_vpc_firewall (dropshot_internal): accepted connection
local_addr = 127.0.0.1:45286
remote_addr = 127.0.0.1:58081
|
| 3832 | 2026-01-14T21:22:52.400Z | INFO | test_vpc_firewall (dropshot_internal): accepted connection
local_addr = 127.0.0.1:45286
remote_addr = 127.0.0.1:57338
|
| 3833 | 2026-01-14T21:22:52.402Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:57338
req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab
uri = /metrics/producers
|
| 3834 | 2026-01-14T21:22:52.402Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:57338
req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab
uri = /metrics/producers
version = 1.0.0
|
| 3835 | 2026-01-14T21:22:52.408Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:57338
req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3836 | 2026-01-14T21:22:52.408Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:57338
req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3837 | 2026-01-14T21:22:52.409Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:57338
req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3838 | 2026-01-14T21:22:52.413Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:58081
req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a
uri = /metrics/collectors
|
| 3839 | 2026-01-14T21:22:52.413Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:58081
req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a
uri = /metrics/collectors
version = 1.0.0
|
| 3840 | 2026-01-14T21:22:52.413Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:58081
req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a
resource = Database
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3841 | 2026-01-14T21:22:52.414Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:58081
req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3842 | 2026-01-14T21:22:52.414Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:58081
req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3843 | 2026-01-14T21:22:52.427Z | INFO | test_vpc_firewall (nexus): registered new oximeter metric collection server
address = [::1]:43210
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
| 3844 | 2026-01-14T21:22:52.427Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 14697
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:58081
req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a
response_code = 204
uri = /metrics/collectors
|
| 3845 | 2026-01-14T21:22:52.429Z | DEBG | test_vpc_firewall (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors", status: 204, headers: {"x-request-id": "7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a", "date": "Wed, 14 Jan 2026 21:22:52 GMT"} })
|
| 3846 | 2026-01-14T21:22:52.429Z | INFO | test_vpc_firewall (oximeter): oximeter registered with nexus
file = oximeter/collector/src/lib.rs:427
id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
|
| 3847 | 2026-01-14T21:22:52.429Z | DEBG | test_vpc_firewall (init_with_steps): Running step start_producer_server
|
| 3848 | 2026-01-14T21:22:52.429Z | DEBG | test_vpc_firewall: Starting test metric Producer Server
|
| 3849 | 2026-01-14T21:22:52.436Z | INFO | test_vpc_firewall (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:43638/v1/projects
|
| 3850 | 2026-01-14T21:22:52.438Z | INFO | test_vpc_firewall (oximeter-agent): starting refresh list task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:554
|
| 3851 | 2026-01-14T21:22:52.550Z | INFO | test_vpc_firewall (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3852 | 2026-01-14T21:22:52.550Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 148557
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:57338
req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab
response_code = 201
uri = /metrics/producers
|
| 3853 | 2026-01-14T21:22:52.551Z | INFO | test_vpc_firewall (dropshot_internal): accepted connection
local_addr = 127.0.0.1:45286
remote_addr = 127.0.0.1:38461
|
| 3854 | 2026-01-14T21:22:52.551Z | INFO | test_vpc_firewall (dropshot_external): accepted connection
local_addr = 127.0.0.1:43638
remote_addr = 127.0.0.1:64367
|
| 3855 | 2026-01-14T21:22:52.552Z | INFO | test_vpc_firewall (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:557
|
| 3856 | 2026-01-14T21:22:52.552Z | DEBG | test_vpc_firewall (producer-registration-task): client response
result = Ok(Response { url: "http://127.0.0.1:45286/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "285d7cf2-f946-46fd-91d9-692bc89e08ab", "content-length": "41", "date": "Wed, 14 Jan 2026 21:22:52 GMT"} })
|
| 3857 | 2026-01-14T21:22:52.553Z | DEBG | test_vpc_firewall (producer-registration-task): successfully registered with Nexus, pausing until time to renew lease
lease_duration = 600s
wait_period = 150s
|
| 3858 | 2026-01-14T21:22:52.555Z | DEBG | test_vpc_firewall (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3859 | 2026-01-14T21:22:52.557Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3860 | 2026-01-14T21:22:52.557Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
version = 1.0.0
|
| 3861 | 2026-01-14T21:22:52.558Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:38461
req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956
uri = /metrics/producers
|
| 3862 | 2026-01-14T21:22:52.558Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:38461
req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956
uri = /metrics/producers
version = 1.0.0
|
| 3863 | 2026-01-14T21:22:52.564Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3864 | 2026-01-14T21:22:52.564Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3865 | 2026-01-14T21:22:52.565Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3866 | 2026-01-14T21:22:52.566Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:38461
req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956
resource = Database
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3867 | 2026-01-14T21:22:52.566Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:38461
req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3868 | 2026-01-14T21:22:52.567Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:38461
req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/producers
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3869 | 2026-01-14T21:22:52.569Z | TRAC | test_vpc_firewall (dropshot_external): incoming request
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
uri = /v1/projects
|
| 3870 | 2026-01-14T21:22:52.569Z | DEBG | test_vpc_firewall (dropshot_external): determined request API version
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
uri = /v1/projects
version = 2025121200.0.0
|
| 3871 | 2026-01-14T21:22:52.569Z | TRAC | test_vpc_firewall (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
uri = /v1/projects
|
| 3872 | 2026-01-14T21:22:52.569Z | DEBG | test_vpc_firewall (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/projects
|
| 3873 | 2026-01-14T21:22:52.569Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3874 | 2026-01-14T21:22:52.569Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3875 | 2026-01-14T21:22:52.570Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3876 | 2026-01-14T21:22:52.580Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 23419
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 3877 | 2026-01-14T21:22:52.582Z | DEBG | test_vpc_firewall (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0838cea8-a1fd-4705-92a3-c03ad2c4bf0a", "content-length": "286", "date": "Wed, 14 Jan 2026 21:22:52 GMT"} })
|
| 3878 | 2026-01-14T21:22:52.582Z | DEBG | test_vpc_firewall (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
|
| 3879 | 2026-01-14T21:22:52.583Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
|
| 3880 | 2026-01-14T21:22:52.583Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
version = 1.0.0
|
| 3881 | 2026-01-14T21:22:52.584Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3882 | 2026-01-14T21:22:52.584Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3883 | 2026-01-14T21:22:52.585Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 3884 | 2026-01-14T21:22:52.587Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3885 | 2026-01-14T21:22:52.587Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3886 | 2026-01-14T21:22:52.589Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3887 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
| 3888 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 3889 | 2026-01-14T21:22:52.595Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3890 | 2026-01-14T21:22:52.596Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3891 | 2026-01-14T21:22:52.597Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3892 | 2026-01-14T21:22:52.599Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 15774
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
|
| 3893 | 2026-01-14T21:22:52.601Z | DEBG | test_vpc_firewall (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "61d06935-8c25-47c2-9be5-b07c09cd2561", "content-length": "29", "date": "Wed, 14 Jan 2026 21:22:52 GMT"} })
|
| 3894 | 2026-01-14T21:22:52.601Z | DEBG | test_vpc_firewall (oximeter-agent): registered new metric producer
address = 127.0.0.1:47995
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 3895 | 2026-01-14T21:22:52.602Z | INFO | test_vpc_firewall (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:632
n_current_tasks = 1
n_pruned_tasks = 0
|
| 3896 | 2026-01-14T21:22:52.676Z | TRAC | test_vpc_firewall (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 47995
|
| 3897 | 2026-01-14T21:22:52.677Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3898 | 2026-01-14T21:22:52.677Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3899 | 2026-01-14T21:22:52.677Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3900 | 2026-01-14T21:22:52.678Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3901 | 2026-01-14T21:22:52.680Z | INFO | test_vpc_firewall (nexus): assigned collector to new producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
| 3902 | 2026-01-14T21:22:52.681Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 122786
local_addr = 127.0.0.1:45286
method = POST
remote_addr = 127.0.0.1:38461
req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956
response_code = 201
uri = /metrics/producers
|
| 3903 | 2026-01-14T21:22:52.682Z | DEBG | test_vpc_firewall (collection-task): reporting oximeter self-collection statistics
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 47995
|
| 3904 | 2026-01-14T21:22:52.684Z | DEBG | test_vpc_firewall (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 47995
|
| 3905 | 2026-01-14T21:22:52.684Z | TRAC | test_vpc_firewall (results-sink): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3906 | 2026-01-14T21:22:52.684Z | DEBG | test_vpc_firewall (results-sink-cluster): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3907 | 2026-01-14T21:22:52.684Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = fm_sitrep_gc
iteration = 2
reason = Timeout
|
| 3908 | 2026-01-14T21:22:52.684Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 3909 | 2026-01-14T21:22:52.684Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 3910 | 2026-01-14T21:22:52.685Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 3911 | 2026-01-14T21:22:52.688Z | DEBG | test_vpc_firewall (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 47995
|
| 3912 | 2026-01-14T21:22:52.691Z | INFO | test_vpc_firewall (dropshot): accepted connection
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:1025
local_addr = 127.0.0.1:47995
remote_addr = 127.0.0.1:55361
|
| 3913 | 2026-01-14T21:22:52.692Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 3914 | 2026-01-14T21:22:52.692Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3915 | 2026-01-14T21:22:52.692Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 3916 | 2026-01-14T21:22:52.692Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 3917 | 2026-01-14T21:22:52.693Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 3918 | 2026-01-14T21:22:52.695Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 3919 | 2026-01-14T21:22:52.701Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
| 3920 | 2026-01-14T21:22:52.702Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3921 | 2026-01-14T21:22:52.702Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3922 | 2026-01-14T21:22:52.702Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3923 | 2026-01-14T21:22:52.706Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = inventory_loader
elapsed = 1.274261974s
iteration = 3
status = {"Loaded":{"collection_id":"6f9d2406-dba2-4825-a5dc-ef88012bdcac","time_loaded":"2026-01-14T21:22:51.432354878Z","time_started":"2026-01-14T21:22:49.434380Z"}}
|
| 3924 | 2026-01-14T21:22:52.706Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = inventory_loader
iteration = 4
reason = Timeout
|
| 3925 | 2026-01-14T21:22:52.706Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
|
| 3926 | 2026-01-14T21:22:52.706Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = inventory_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3927 | 2026-01-14T21:22:52.707Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3928 | 2026-01-14T21:22:52.707Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3929 | 2026-01-14T21:22:52.707Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3930 | 2026-01-14T21:22:52.709Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = physical_disk_adoption
iteration = 3
reason = Dependency
|
| 3931 | 2026-01-14T21:22:52.709Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = physical_disk_adoption
elapsed = 47.994\u{b5}s
iteration = 3
status = {"error":"task disabled"}
|
| 3932 | 2026-01-14T21:22:52.709Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_planner
iteration = 5
reason = Dependency
|
| 3933 | 2026-01-14T21:22:52.709Z | DEBG | test_vpc_firewall (BackgroundTasks): blueprint planning disabled, doing nothing
background_task = blueprint_planner
|
| 3934 | 2026-01-14T21:22:52.709Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_planner
elapsed = 23.866\u{b5}s
iteration = 5
status = "Disabled"
|
| 3935 | 2026-01-14T21:22:52.709Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = blueprint_rendezvous
iteration = 3
reason = Dependency
|
| 3936 | 2026-01-14T21:22:52.709Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 3937 | 2026-01-14T21:22:52.709Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3938 | 2026-01-14T21:22:52.710Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3939 | 2026-01-14T21:22:52.710Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3940 | 2026-01-14T21:22:52.711Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3941 | 2026-01-14T21:22:52.714Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = multicast_reconciler
iteration = 5
reason = Dependency
|
| 3942 | 2026-01-14T21:22:52.715Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast group reconciler activating
background_task = multicast_reconciler
|
| 3943 | 2026-01-14T21:22:52.715Z | TRAC | test_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass
background_task = multicast_reconciler
|
| 3944 | 2026-01-14T21:22:52.715Z | TRAC | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
|
| 3945 | 2026-01-14T21:22:52.718Z | TRAC | test_vpc_firewall (dropshot): incoming request
local_addr = 127.0.0.1:47995
method = GET
remote_addr = 127.0.0.1:55361
req_id = 7057ea13-062c-400e-a6d0-6658798aa19b
uri = /913233fe-92a8-4635-9572-183f495429c4
|
| 3946 | 2026-01-14T21:22:52.734Z | INFO | test_vpc_firewall (dropshot): request completed
file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:867
latency_us = 15084
local_addr = 127.0.0.1:47995
method = GET
remote_addr = 127.0.0.1:55361
req_id = 7057ea13-062c-400e-a6d0-6658798aa19b
response_code = 200
uri = /913233fe-92a8-4635-9572-183f495429c4
|
| 3947 | 2026-01-14T21:22:52.734Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3948 | 2026-01-14T21:22:52.742Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 3949 | 2026-01-14T21:22:52.745Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
| 3950 | 2026-01-14T21:22:52.745Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 3951 | 2026-01-14T21:22:52.745Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3952 | 2026-01-14T21:22:52.745Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3953 | 2026-01-14T21:22:52.746Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3954 | 2026-01-14T21:22:52.754Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3955 | 2026-01-14T21:22:52.772Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 3956 | 2026-01-14T21:22:52.772Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 3957 | 2026-01-14T21:22:52.772Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3958 | 2026-01-14T21:22:52.772Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3959 | 2026-01-14T21:22:52.772Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3960 | 2026-01-14T21:22:52.774Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3961 | 2026-01-14T21:22:52.777Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3962 | 2026-01-14T21:22:52.814Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Inventory
result = Ok(())
|
| 3963 | 2026-01-14T21:22:52.814Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
|
| 3964 | 2026-01-14T21:22:52.814Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = inventory_loader
roles = RoleSet { roles: {} }
|
| 3965 | 2026-01-14T21:22:52.815Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = inventory_loader
resource = Database
result = Ok(())
|
| 3966 | 2026-01-14T21:22:52.817Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 3967 | 2026-01-14T21:22:52.818Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 3968 | 2026-01-14T21:22:52.819Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 3969 | 2026-01-14T21:22:52.825Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 72 (0x48) bytes\n0000: 4c 69 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 Li..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........
kind = dns
peer_addr = [::1]:12414
req_id = d75b2aa7-3bbc-4b7c-86e8-82eb214186ed
|
| 3970 | 2026-01-14T21:22:52.825Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 19561,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:12414
req_id = d75b2aa7-3bbc-4b7c-86e8-82eb214186ed
|
| 3971 | 2026-01-14T21:22:52.825Z | DEBG | test_vpc_firewall (store): query key
key = _dendrite._tcp
|
| 3972 | 2026-01-14T21:22:52.825Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 3973 | 2026-01-14T21:22:52.837Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
kind = dns
peer_addr = [::1]:12414
query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } }
records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }]
req_id = d75b2aa7-3bbc-4b7c-86e8-82eb214186ed
|
| 3974 | 2026-01-14T21:22:52.837Z | TRAC | test_vpc_firewall (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 47995
|
| 3975 | 2026-01-14T21:22:52.838Z | WARN | test_vpc_firewall (results-sink-cluster): failed to insert some results into metric DB
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
error = Failed to check out connection to database: No backends found for this service
file = oximeter/collector/src/results_sink.rs:92
|
| 3976 | 2026-01-14T21:22:52.863Z | DEBG | test_vpc_firewall (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 5
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 47995
|
| 3977 | 2026-01-14T21:22:52.864Z | TRAC | test_vpc_firewall (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 47995
|
| 3978 | 2026-01-14T21:22:52.864Z | TRAC | test_vpc_firewall (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
producer_ip = 127.0.0.1
producer_port = 47995
|
| 3979 | 2026-01-14T21:22:52.865Z | DEBG | test_vpc_firewall (results-sink): inserting 19 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3980 | 2026-01-14T21:22:52.865Z | DEBG | test_vpc_firewall (results-sink-cluster): inserting 18 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 3981 | 2026-01-14T21:22:52.865Z | DEBG | test_vpc_firewall (clickhouse-client): unrolling 19 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 3982 | 2026-01-14T21:22:52.866Z | DEBG | test_vpc_firewall (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 3983 | 2026-01-14T21:22:52.866Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
|
| 3984 | 2026-01-14T21:22:52.867Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 3985 | 2026-01-14T21:22:52.872Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 3986 | 2026-01-14T21:22:52.874Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 3987 | 2026-01-14T21:22:52.875Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 3988 | 2026-01-14T21:22:52.876Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 3989 | 2026-01-14T21:22:52.879Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3990 | 2026-01-14T21:22:52.879Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 3991 | 2026-01-14T21:22:52.879Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 3992 | 2026-01-14T21:22:52.880Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 3993 | 2026-01-14T21:22:52.883Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
|
| 3994 | 2026-01-14T21:22:52.883Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_gc
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 3995 | 2026-01-14T21:22:52.883Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
|
| 3996 | 2026-01-14T21:22:52.883Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {} }
|
| 3997 | 2026-01-14T21:22:52.887Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Database
result = Ok(())
|
| 3998 | 2026-01-14T21:22:52.902Z | DEBG | test_vpc_firewall (BackgroundTasks): latest inventory collection is unchanged
background_task = inventory_loader
original_id = 6f9d2406-dba2-4825-a5dc-ef88012bdcac
original_time_started = 2026-01-14 21:22:49.434380 UTC
|
| 3999 | 2026-01-14T21:22:52.902Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = inventory_loader
elapsed = 195.880992ms
iteration = 4
status = {"Loaded":{"collection_id":"6f9d2406-dba2-4825-a5dc-ef88012bdcac","time_loaded":"2026-01-14T21:22:52.706776045Z","time_started":"2026-01-14T21:22:49.434380Z"}}
|
| 4000 | 2026-01-14T21:22:52.905Z | TRAC | test_vpc_firewall (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4001 | 2026-01-14T21:22:52.905Z | DEBG | test_vpc_firewall (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
schema = TimeseriesSchema { timeseries_name: TimeseriesName("oximeter_collector:collections"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "base_route", field_type: String, source: Metric, description: "" }, FieldSchema { name: "collector_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "collector_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "collector_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "producer_id", field_type: Uuid, source: Metric, description: "" }, FieldSchema { name: "producer_ip", field_type: IpAddr, source: Metric, description: "" }, FieldSchema { name: "producer_port", field_type: U16, source: Metric, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:52.866650652Z }
timeseries_name = oximeter_collector:collections
|
| 4002 | 2026-01-14T21:22:52.907Z | DEBG | test_vpc_firewall (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4003 | 2026-01-14T21:22:52.907Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('oximeter_collector:collections') FORMAT Native;
|
| 4004 | 2026-01-14T21:22:52.908Z | DEBG | test_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv
dns_name = _dendrite._tcp.control-plane.oxide.internal
response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10496, tv_nsec: 294874075 } })
|
| 4005 | 2026-01-14T21:22:52.908Z | TRAC | test_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
|
| 4006 | 2026-01-14T21:22:52.908Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = fm_sitrep_loader
iteration = 2
reason = Timeout
|
| 4007 | 2026-01-14T21:22:52.908Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
|
| 4008 | 2026-01-14T21:22:52.908Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = fm_sitrep_loader
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4009 | 2026-01-14T21:22:52.908Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 4010 | 2026-01-14T21:22:52.908Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 4011 | 2026-01-14T21:22:52.913Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 4012 | 2026-01-14T21:22:52.926Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4013 | 2026-01-14T21:22:52.935Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
| 4014 | 2026-01-14T21:22:52.935Z | TRAC | test_vpc_firewall (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
uri = /v1/projects
|
| 4015 | 2026-01-14T21:22:52.935Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = AuditLog
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4016 | 2026-01-14T21:22:52.935Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4017 | 2026-01-14T21:22:52.935Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4018 | 2026-01-14T21:22:52.935Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4019 | 2026-01-14T21:22:52.936Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4020 | 2026-01-14T21:22:52.939Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 4021 | 2026-01-14T21:22:52.939Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4022 | 2026-01-14T21:22:52.939Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 4023 | 2026-01-14T21:22:52.939Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 4024 | 2026-01-14T21:22:52.940Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 4025 | 2026-01-14T21:22:52.942Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_gc
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4026 | 2026-01-14T21:22:52.949Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Modify
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_gc
resource = Fleet
result = Ok(())
|
| 4027 | 2026-01-14T21:22:52.951Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4028 | 2026-01-14T21:22:52.959Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Fleet
result = Ok(())
|
| 4029 | 2026-01-14T21:22:52.960Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
|
| 4030 | 2026-01-14T21:22:52.960Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = fm_sitrep_loader
roles = RoleSet { roles: {} }
|
| 4031 | 2026-01-14T21:22:52.960Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = fm_sitrep_loader
resource = Database
result = Ok(())
|
| 4032 | 2026-01-14T21:22:52.963Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4033 | 2026-01-14T21:22:52.968Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 4034 | 2026-01-14T21:22:52.968Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 4035 | 2026-01-14T21:22:52.969Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4036 | 2026-01-14T21:22:52.969Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 4037 | 2026-01-14T21:22:52.969Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 4038 | 2026-01-14T21:22:52.969Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 4039 | 2026-01-14T21:22:52.978Z | TRAC | test_vpc_firewall (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4040 | 2026-01-14T21:22:52.978Z | DEBG | test_vpc_firewall (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
schema = TimeseriesSchema { timeseries_name: TimeseriesName("http_service:request_latency_histogram"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "name", field_type: String, source: Target, description: "" }, FieldSchema { name: "operation_id", field_type: String, source: Metric, description: "" }, FieldSchema { name: "status_code", field_type: U16, source: Metric, description: "" }}, datum_type: HistogramU64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:52.907332968Z }
timeseries_name = http_service:request_latency_histogram
|
| 4041 | 2026-01-14T21:22:52.985Z | DEBG | test_vpc_firewall (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4042 | 2026-01-14T21:22:52.985Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
|
| 4043 | 2026-01-14T21:22:52.986Z | WARN | test_vpc_firewall (results-sink-cluster): failed to insert some results into metric DB
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
error = Failed to check out connection to database: No backends found for this service
file = oximeter/collector/src/results_sink.rs:92
|
| 4044 | 2026-01-14T21:22:52.987Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4045 | 2026-01-14T21:22:52.990Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = AuditLog
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4046 | 2026-01-14T21:22:52.990Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4047 | 2026-01-14T21:22:52.990Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4048 | 2026-01-14T21:22:52.991Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4049 | 2026-01-14T21:22:52.995Z | DEBG | test_vpc_firewall (BackgroundTasks): deleted 0 of 0 sitreps sitreps
background_task = fm_sitrep_gc
case_ereports_deleted = 0
cases_deleted = 0
ids = []
sitreps_deleted = 0
|
| 4050 | 2026-01-14T21:22:52.995Z | TRAC | test_vpc_firewall (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted
background_task = fm_sitrep_gc
|
| 4051 | 2026-01-14T21:22:52.995Z | INFO | test_vpc_firewall (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0
background_task = fm_sitrep_gc
|
| 4052 | 2026-01-14T21:22:52.995Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = fm_sitrep_gc
elapsed = 311.099736ms
iteration = 2
status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
|
| 4053 | 2026-01-14T21:22:53.004Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = fm_sitrep_loader
elapsed = 95.966202ms
iteration = 2
status = "NoSitrep"
|
| 4054 | 2026-01-14T21:22:53.005Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4055 | 2026-01-14T21:22:53.040Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 4056 | 2026-01-14T21:22:53.040Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 4057 | 2026-01-14T21:22:53.040Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 4058 | 2026-01-14T21:22:53.041Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 4059 | 2026-01-14T21:22:53.054Z | TRAC | test_vpc_firewall (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4060 | 2026-01-14T21:22:53.054Z | DEBG | test_vpc_firewall (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:cpus_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:52.985503957Z }
timeseries_name = collection_target:cpus_provisioned
|
| 4061 | 2026-01-14T21:22:53.056Z | DEBG | test_vpc_firewall (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4062 | 2026-01-14T21:22:53.057Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
|
| 4063 | 2026-01-14T21:22:53.057Z | TRAC | test_vpc_firewall (dns): buffer
buffer = Length: 108 (0x6c) bytes\n0000: bf 01 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........
kind = dns
peer_addr = [::1]:47791
req_id = 65c22531-7f88-4f30-b951-a6b950beb52a
|
| 4064 | 2026-01-14T21:22:53.058Z | DEBG | test_vpc_firewall (dns): message_request
kind = dns
mr = MessageRequest {\n header: Header {\n id: 48897,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n}
peer_addr = [::1]:47791
req_id = 65c22531-7f88-4f30-b951-a6b950beb52a
|
| 4065 | 2026-01-14T21:22:53.059Z | DEBG | test_vpc_firewall (store): query key
key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
|
| 4066 | 2026-01-14T21:22:53.059Z | DEBG | test_vpc_firewall (dns): dns response
additional_records = []
kind = dns
peer_addr = [::1]:47791
query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } }
records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }]
req_id = 65c22531-7f88-4f30-b951-a6b950beb52a
|
| 4067 | 2026-01-14T21:22:53.067Z | INFO | test_vpc_firewall (BackgroundTasks): ensured all Crucible datasets present in inventory have database records
background_task = blueprint_rendezvous
num_already_exist = 0
num_inserted = 0
num_not_in_inventory = 0
|
| 4068 | 2026-01-14T21:22:53.067Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 4069 | 2026-01-14T21:22:53.067Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4070 | 2026-01-14T21:22:53.067Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 4071 | 2026-01-14T21:22:53.067Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 4072 | 2026-01-14T21:22:53.068Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 4073 | 2026-01-14T21:22:53.075Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4074 | 2026-01-14T21:22:53.076Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4075 | 2026-01-14T21:22:53.076Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4076 | 2026-01-14T21:22:53.076Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4077 | 2026-01-14T21:22:53.086Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4078 | 2026-01-14T21:22:53.090Z | TRAC | test_vpc_firewall (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4079 | 2026-01-14T21:22:53.090Z | DEBG | test_vpc_firewall (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:ram_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:53.056792012Z }
timeseries_name = collection_target:ram_provisioned
|
| 4080 | 2026-01-14T21:22:53.092Z | DEBG | test_vpc_firewall (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4081 | 2026-01-14T21:22:53.092Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
|
| 4082 | 2026-01-14T21:22:53.187Z | TRAC | test_vpc_firewall (DpdClient): client request
background_task = multicast_reconciler
body = None
method = GET
uri = http://[::1]:65194/switch/identifiers
|
| 4083 | 2026-01-14T21:22:53.188Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4084 | 2026-01-14T21:22:53.195Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 4085 | 2026-01-14T21:22:53.195Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
|
| 4086 | 2026-01-14T21:22:53.195Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = blueprint_rendezvous
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4087 | 2026-01-14T21:22:53.195Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 4088 | 2026-01-14T21:22:53.195Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 4089 | 2026-01-14T21:22:53.196Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 4090 | 2026-01-14T21:22:53.198Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4091 | 2026-01-14T21:22:53.199Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4092 | 2026-01-14T21:22:53.199Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4093 | 2026-01-14T21:22:53.199Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4094 | 2026-01-14T21:22:53.206Z | TRAC | test_vpc_firewall (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4095 | 2026-01-14T21:22:53.206Z | DEBG | test_vpc_firewall (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:virtual_disk_space_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:53.091961882Z }
timeseries_name = collection_target:virtual_disk_space_provisioned
|
| 4096 | 2026-01-14T21:22:53.213Z | DEBG | test_vpc_firewall (clickhouse-client): inserting 5 new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4097 | 2026-01-14T21:22:53.214Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 6
n_rows = 5
sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
|
| 4098 | 2026-01-14T21:22:53.219Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4099 | 2026-01-14T21:22:53.225Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = ListChildren
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Fleet
result = Ok(())
|
| 4100 | 2026-01-14T21:22:53.225Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
|
| 4101 | 2026-01-14T21:22:53.225Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = blueprint_rendezvous
roles = RoleSet { roles: {} }
|
| 4102 | 2026-01-14T21:22:53.225Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = blueprint_rendezvous
resource = Database
result = Ok(())
|
| 4103 | 2026-01-14T21:22:53.226Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4104 | 2026-01-14T21:22:53.233Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4105 | 2026-01-14T21:22:53.234Z | INFO | test_vpc_firewall (SagaQuiesceHandle): tracking newly created saga
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4106 | 2026-01-14T21:22:53.234Z | INFO | test_vpc_firewall (SagaExecutor): preparing saga
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
|
| 4107 | 2026-01-14T21:22:53.234Z | INFO | test_vpc_firewall (SEC): saga create
dag = {"end_node":21,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[2,3,null],[18,19,null],[20,0,null],[19,21,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"springfield-squidport"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}},"device_token_expiration":null},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":20}
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4108 | 2026-01-14T21:22:53.235Z | INFO | test_vpc_firewall (SecStore): creating saga
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
|
| 4109 | 2026-01-14T21:22:53.247Z | TRAC | test_vpc_firewall (DpdClient): client response
background_task = multicast_reconciler
result = Ok(Response { url: "http://[::1]:65194/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "2c9aedbe-f883-40a6-89a4-6282f2c200c0", "content-length": "206", "date": "Wed, 14 Jan 2026 21:22:53 GMT"} })
|
| 4110 | 2026-01-14T21:22:53.247Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Creating
|
| 4111 | 2026-01-14T21:22:53.247Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4112 | 2026-01-14T21:22:53.247Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4113 | 2026-01-14T21:22:53.248Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4114 | 2026-01-14T21:22:53.255Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
|
| 4115 | 2026-01-14T21:22:53.259Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Creating
|
| 4116 | 2026-01-14T21:22:53.260Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Deleting
|
| 4117 | 2026-01-14T21:22:53.260Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4118 | 2026-01-14T21:22:53.260Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4119 | 2026-01-14T21:22:53.262Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4120 | 2026-01-14T21:22:53.265Z | INFO | test_vpc_firewall (SagaExecutor): starting saga
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
|
| 4121 | 2026-01-14T21:22:53.265Z | INFO | test_vpc_firewall (SEC): saga start
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4122 | 2026-01-14T21:22:53.265Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N020 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4123 | 2026-01-14T21:22:53.265Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 20
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4124 | 2026-01-14T21:22:53.279Z | INFO | test_vpc_firewall (BackgroundTasks): all LocalStorage datasets reconciled
background_task = blueprint_rendezvous
num_already_exist = 0
num_already_tombstoned = 0
num_inserted = 0
num_not_in_inventory = 0
num_tombstoned = 0
|
| 4125 | 2026-01-14T21:22:53.280Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = blueprint_rendezvous
elapsed = 571.339761ms
iteration = 3
status = {"blueprint_id":"262c300c-11e4-479f-abb4-29db6faa14be","inventory_collection_id":"6f9d2406-dba2-4825-a5dc-ef88012bdcac","stats":{"crucible_dataset":{"num_already_exist":0,"num_inserted":0,"num_not_in_inventory":0},"debug_dataset":{"num_already_exist":0,"num_already_tombstoned":0,"num_inserted":0,"num_not_in_inventory":0,"num_tombstoned":0},"local_storage_dataset":{"num_already_exist":0,"num_already_tombstoned":0,"num_inserted":0,"num_not_in_inventory":0,"num_tombstoned":0}}}
|
| 4126 | 2026-01-14T21:22:53.287Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Deleting
|
| 4127 | 2026-01-14T21:22:53.287Z | TRAC | test_vpc_firewall (BackgroundTasks): searching for multicast groups
background_task = multicast_reconciler
state = Active
|
| 4128 | 2026-01-14T21:22:53.287Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4129 | 2026-01-14T21:22:53.287Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4130 | 2026-01-14T21:22:53.288Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4131 | 2026-01-14T21:22:53.300Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N020 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4132 | 2026-01-14T21:22:53.300Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 20
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4133 | 2026-01-14T21:22:53.303Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 2
table_name = fields_ipaddr
|
| 4134 | 2026-01-14T21:22:53.303Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 13
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
| 4135 | 2026-01-14T21:22:53.306Z | TRAC | test_vpc_firewall (BackgroundTasks): found multicast groups
background_task = multicast_reconciler
count = 0
state = Active
|
| 4136 | 2026-01-14T21:22:53.307Z | TRAC | test_vpc_firewall (BackgroundTasks): reconciling member state changes
background_task = multicast_reconciler
|
| 4137 | 2026-01-14T21:22:53.307Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4138 | 2026-01-14T21:22:53.307Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4139 | 2026-01-14T21:22:53.308Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4140 | 2026-01-14T21:22:53.311Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N000 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4141 | 2026-01-14T21:22:53.311Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4142 | 2026-01-14T21:22:53.313Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 13
table_name = fields_string
|
| 4143 | 2026-01-14T21:22:53.313Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 8
sql = INSERT INTO oximeter.fields_u16 FORMAT Native
|
| 4144 | 2026-01-14T21:22:53.322Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4145 | 2026-01-14T21:22:53.322Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4146 | 2026-01-14T21:22:53.323Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4147 | 2026-01-14T21:22:53.330Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4148 | 2026-01-14T21:22:53.330Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4149 | 2026-01-14T21:22:53.330Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4150 | 2026-01-14T21:22:53.330Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4151 | 2026-01-14T21:22:53.331Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4152 | 2026-01-14T21:22:53.334Z | DEBG | test_vpc_firewall (BackgroundTasks): found groups for member reconciliation
background_task = multicast_reconciler
total_groups = 0
|
| 4153 | 2026-01-14T21:22:53.334Z | DEBG | test_vpc_firewall (BackgroundTasks): member state reconciliation completed
background_task = multicast_reconciler
members_processed = 0
|
| 4154 | 2026-01-14T21:22:53.334Z | TRAC | test_vpc_firewall (BackgroundTasks): cleaning up deleted multicast members
background_task = multicast_reconciler
|
| 4155 | 2026-01-14T21:22:53.334Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
|
| 4156 | 2026-01-14T21:22:53.334Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = multicast_reconciler
roles = RoleSet { roles: {} }
|
| 4157 | 2026-01-14T21:22:53.335Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = multicast_reconciler
resource = Database
result = Ok(())
|
| 4158 | 2026-01-14T21:22:53.338Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 8
table_name = fields_u16
|
| 4159 | 2026-01-14T21:22:53.338Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 20
sql = INSERT INTO oximeter.fields_uuid FORMAT Native
|
| 4160 | 2026-01-14T21:22:53.346Z | DEBG | test_vpc_firewall (BackgroundTasks): multicast group member complete deletion finished
background_task = multicast_reconciler
left_and_time_deleted_members_deleted = 0
|
| 4161 | 2026-01-14T21:22:53.346Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation cycle completed
active_groups_verified = 0
background_task = multicast_reconciler
error_count = 0
external_groups_created = 0
external_groups_deleted = 0
member_lifecycle_transitions = 0
orphaned_member_cleanup = 0
total_dpd_operations = 0
|
| 4162 | 2026-01-14T21:22:53.348Z | TRAC | test_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent
background_task = multicast_reconciler
|
| 4163 | 2026-01-14T21:22:53.349Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = multicast_reconciler
elapsed = 634.077604ms
iteration = 5
status = {"disabled":false,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
|
| 4164 | 2026-01-14T21:22:53.349Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4165 | 2026-01-14T21:22:53.349Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4166 | 2026-01-14T21:22:53.350Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4167 | 2026-01-14T21:22:53.351Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4168 | 2026-01-14T21:22:53.357Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 20
table_name = fields_uuid
|
| 4169 | 2026-01-14T21:22:53.357Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 5
n_rows = 1
sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
|
| 4170 | 2026-01-14T21:22:53.359Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4171 | 2026-01-14T21:22:53.364Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4172 | 2026-01-14T21:22:53.364Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4173 | 2026-01-14T21:22:53.364Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4174 | 2026-01-14T21:22:53.364Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = ProjectCreateRecord
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4175 | 2026-01-14T21:22:53.366Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 1
table_name = measurements_cumulativeu64
|
| 4176 | 2026-01-14T21:22:53.366Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 19
n_rows = 6
sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
|
| 4177 | 2026-01-14T21:22:53.373Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 6
table_name = measurements_histogramu64
|
| 4178 | 2026-01-14T21:22:53.373Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 12
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
| 4179 | 2026-01-14T21:22:53.377Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 12
table_name = measurements_i64
|
| 4180 | 2026-01-14T21:22:53.377Z | TRAC | test_vpc_firewall (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4181 | 2026-01-14T21:22:53.384Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N000 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4182 | 2026-01-14T21:22:53.385Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "name": String("springfield-squidport"), "time_created": String("2026-01-14T21:22:53.330230Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.330230Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}])
node_id = 0
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4183 | 2026-01-14T21:22:53.390Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N001 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4184 | 2026-01-14T21:22:53.390Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4185 | 2026-01-14T21:22:53.395Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N001 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4186 | 2026-01-14T21:22:53.395Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Object {"authz_project": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd80:d618:53ef::/48"), "name": String("default")}})
node_id = 1
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4187 | 2026-01-14T21:22:53.400Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N002 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4188 | 2026-01-14T21:22:53.400Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4189 | 2026-01-14T21:22:53.405Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N002 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4190 | 2026-01-14T21:22:53.405Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 2
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4191 | 2026-01-14T21:22:53.410Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N003 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4192 | 2026-01-14T21:22:53.410Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4193 | 2026-01-14T21:22:53.416Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N003 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4194 | 2026-01-14T21:22:53.416Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("e2b55e55-c331-4278-b8fe-0db988ff2f45"))
node_id = 3
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4195 | 2026-01-14T21:22:53.422Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N004 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4196 | 2026-01-14T21:22:53.423Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4197 | 2026-01-14T21:22:53.439Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N004 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4198 | 2026-01-14T21:22:53.439Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"))
node_id = 4
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4199 | 2026-01-14T21:22:53.444Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N005 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4200 | 2026-01-14T21:22:53.445Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4201 | 2026-01-14T21:22:53.450Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N005 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4202 | 2026-01-14T21:22:53.450Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("183f06e0-c10f-44bb-960e-f856b4d0f52f"))
node_id = 5
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4203 | 2026-01-14T21:22:53.456Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N006 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4204 | 2026-01-14T21:22:53.456Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4205 | 2026-01-14T21:22:53.461Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N006 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4206 | 2026-01-14T21:22:53.461Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("5b8dc003-44ca-4ade-bbff-62be25d55e7b"))
node_id = 6
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4207 | 2026-01-14T21:22:53.467Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N007 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4208 | 2026-01-14T21:22:53.467Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4209 | 2026-01-14T21:22:53.472Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N007 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4210 | 2026-01-14T21:22:53.473Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"))
node_id = 7
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4211 | 2026-01-14T21:22:53.477Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N008 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4212 | 2026-01-14T21:22:53.477Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4213 | 2026-01-14T21:22:53.483Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N008 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4214 | 2026-01-14T21:22:53.483Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("fb758050-22b5-4004-83d0-0eab561238d6"))
node_id = 8
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4215 | 2026-01-14T21:22:53.490Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N009 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4216 | 2026-01-14T21:22:53.490Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4217 | 2026-01-14T21:22:53.497Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N009 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4218 | 2026-01-14T21:22:53.497Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("e009feff-2962-49c4-a3ad-f9bca3c65812"))
node_id = 9
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4219 | 2026-01-14T21:22:53.503Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N010 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4220 | 2026-01-14T21:22:53.503Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 10
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4221 | 2026-01-14T21:22:53.508Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4222 | 2026-01-14T21:22:53.508Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4223 | 2026-01-14T21:22:53.508Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4224 | 2026-01-14T21:22:53.508Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4225 | 2026-01-14T21:22:53.509Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4226 | 2026-01-14T21:22:53.515Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4227 | 2026-01-14T21:22:53.515Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4228 | 2026-01-14T21:22:53.515Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4229 | 2026-01-14T21:22:53.516Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4230 | 2026-01-14T21:22:53.522Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4231 | 2026-01-14T21:22:53.522Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4232 | 2026-01-14T21:22:53.522Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4233 | 2026-01-14T21:22:53.523Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4234 | 2026-01-14T21:22:53.530Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4235 | 2026-01-14T21:22:53.539Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4236 | 2026-01-14T21:22:53.539Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4237 | 2026-01-14T21:22:53.539Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4238 | 2026-01-14T21:22:53.540Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4239 | 2026-01-14T21:22:53.554Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N010 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4240 | 2026-01-14T21:22:53.554Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.508432Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.508432Z")}, "ipv6_prefix": String("fd80:d618:53ef::/48"), "project_id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "subnet_gen": Number(1), "system_router_id": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "vni": Number(3604191)}])
node_id = 10
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4241 | 2026-01-14T21:22:53.561Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N011 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4242 | 2026-01-14T21:22:53.561Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 11
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4243 | 2026-01-14T21:22:53.568Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4244 | 2026-01-14T21:22:53.568Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4245 | 2026-01-14T21:22:53.568Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4246 | 2026-01-14T21:22:53.569Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4247 | 2026-01-14T21:22:53.569Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4248 | 2026-01-14T21:22:53.578Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4249 | 2026-01-14T21:22:53.578Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4250 | 2026-01-14T21:22:53.578Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4251 | 2026-01-14T21:22:53.580Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4252 | 2026-01-14T21:22:53.587Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4253 | 2026-01-14T21:22:53.587Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4254 | 2026-01-14T21:22:53.588Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4255 | 2026-01-14T21:22:53.589Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4256 | 2026-01-14T21:22:53.596Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4257 | 2026-01-14T21:22:53.606Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4258 | 2026-01-14T21:22:53.606Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4259 | 2026-01-14T21:22:53.606Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4260 | 2026-01-14T21:22:53.607Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4261 | 2026-01-14T21:22:53.616Z | TRAC | test_vpc_firewall (results-sink): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4262 | 2026-01-14T21:22:53.616Z | TRAC | test_vpc_firewall (results-sink-cluster): batch interval expired, but no samples to insert
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4263 | 2026-01-14T21:22:53.679Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N011 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4264 | 2026-01-14T21:22:53.679Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 11
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4265 | 2026-01-14T21:22:53.687Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N012 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4266 | 2026-01-14T21:22:53.688Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 12
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4267 | 2026-01-14T21:22:53.694Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4268 | 2026-01-14T21:22:53.694Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4269 | 2026-01-14T21:22:53.694Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4270 | 2026-01-14T21:22:53.694Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4271 | 2026-01-14T21:22:53.695Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4272 | 2026-01-14T21:22:53.701Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4273 | 2026-01-14T21:22:53.701Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4274 | 2026-01-14T21:22:53.701Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4275 | 2026-01-14T21:22:53.702Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4276 | 2026-01-14T21:22:53.708Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4277 | 2026-01-14T21:22:53.708Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4278 | 2026-01-14T21:22:53.708Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4279 | 2026-01-14T21:22:53.709Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4280 | 2026-01-14T21:22:53.717Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4281 | 2026-01-14T21:22:53.725Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4282 | 2026-01-14T21:22:53.726Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4283 | 2026-01-14T21:22:53.726Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4284 | 2026-01-14T21:22:53.726Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4285 | 2026-01-14T21:22:53.808Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N012 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4286 | 2026-01-14T21:22:53.808Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 12
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4287 | 2026-01-14T21:22:53.814Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N013 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4288 | 2026-01-14T21:22:53.814Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 13
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4289 | 2026-01-14T21:22:53.820Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4290 | 2026-01-14T21:22:53.820Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4291 | 2026-01-14T21:22:53.820Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4292 | 2026-01-14T21:22:53.820Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4293 | 2026-01-14T21:22:53.821Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4294 | 2026-01-14T21:22:53.831Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4295 | 2026-01-14T21:22:53.831Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4296 | 2026-01-14T21:22:53.831Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4297 | 2026-01-14T21:22:53.832Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4298 | 2026-01-14T21:22:53.840Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4299 | 2026-01-14T21:22:53.841Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4300 | 2026-01-14T21:22:53.841Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4301 | 2026-01-14T21:22:53.842Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4302 | 2026-01-14T21:22:53.848Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4303 | 2026-01-14T21:22:53.859Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4304 | 2026-01-14T21:22:53.860Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4305 | 2026-01-14T21:22:53.860Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4306 | 2026-01-14T21:22:53.860Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateV6Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4307 | 2026-01-14T21:22:53.871Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N013 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4308 | 2026-01-14T21:22:53.871Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 13
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4309 | 2026-01-14T21:22:53.878Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N014 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4310 | 2026-01-14T21:22:53.878Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 14
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4311 | 2026-01-14T21:22:53.885Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4312 | 2026-01-14T21:22:53.885Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4313 | 2026-01-14T21:22:53.885Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4314 | 2026-01-14T21:22:53.885Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4315 | 2026-01-14T21:22:53.886Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4316 | 2026-01-14T21:22:53.892Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4317 | 2026-01-14T21:22:53.892Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4318 | 2026-01-14T21:22:53.892Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4319 | 2026-01-14T21:22:53.894Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4320 | 2026-01-14T21:22:53.900Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4321 | 2026-01-14T21:22:53.900Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4322 | 2026-01-14T21:22:53.900Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4323 | 2026-01-14T21:22:53.901Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4324 | 2026-01-14T21:22:53.907Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4325 | 2026-01-14T21:22:53.916Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4326 | 2026-01-14T21:22:53.925Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N014 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4327 | 2026-01-14T21:22:53.925Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("fb758050-22b5-4004-83d0-0eab561238d6"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("fb758050-22b5-4004-83d0-0eab561238d6"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.885181Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.885181Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd80:d618:53ef::/64"), "rcgen": Number(1), "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}])
node_id = 14
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4328 | 2026-01-14T21:22:53.931Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N015 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4329 | 2026-01-14T21:22:53.932Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 15
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4330 | 2026-01-14T21:22:53.939Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4331 | 2026-01-14T21:22:53.939Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4332 | 2026-01-14T21:22:53.939Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4333 | 2026-01-14T21:22:53.939Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4334 | 2026-01-14T21:22:53.940Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4335 | 2026-01-14T21:22:53.946Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4336 | 2026-01-14T21:22:53.946Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4337 | 2026-01-14T21:22:53.946Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4338 | 2026-01-14T21:22:53.947Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4339 | 2026-01-14T21:22:53.956Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4340 | 2026-01-14T21:22:53.956Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4341 | 2026-01-14T21:22:53.956Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4342 | 2026-01-14T21:22:53.957Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4343 | 2026-01-14T21:22:53.964Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4344 | 2026-01-14T21:22:53.974Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4345 | 2026-01-14T21:22:53.974Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4346 | 2026-01-14T21:22:53.974Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4347 | 2026-01-14T21:22:53.975Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateSubnetRoute
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4348 | 2026-01-14T21:22:53.990Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N015 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4349 | 2026-01-14T21:22:53.991Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}})
node_id = 15
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4350 | 2026-01-14T21:22:53.993Z | DEBG | test_vpc_firewall (BackgroundTasks): activating
background_task = reconfigurator_config_watcher
iteration = 4
reason = Timeout
|
| 4351 | 2026-01-14T21:22:53.993Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
|
| 4352 | 2026-01-14T21:22:53.993Z | TRAC | test_vpc_firewall (BackgroundTasks): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }
background_task = reconfigurator_config_watcher
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4353 | 2026-01-14T21:22:53.993Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 4354 | 2026-01-14T21:22:53.993Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 4355 | 2026-01-14T21:22:53.994Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 4356 | 2026-01-14T21:22:53.999Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
|
| 4357 | 2026-01-14T21:22:54.009Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = BlueprintConfig
result = Ok(())
|
| 4358 | 2026-01-14T21:22:54.010Z | TRAC | test_vpc_firewall (BackgroundTasks): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
|
| 4359 | 2026-01-14T21:22:54.010Z | DEBG | test_vpc_firewall (BackgroundTasks): roles
background_task = reconfigurator_config_watcher
roles = RoleSet { roles: {} }
|
| 4360 | 2026-01-14T21:22:54.010Z | DEBG | test_vpc_firewall (BackgroundTasks): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
background_task = reconfigurator_config_watcher
resource = Database
result = Ok(())
|
| 4361 | 2026-01-14T21:22:54.017Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N016 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4362 | 2026-01-14T21:22:54.017Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 16
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4363 | 2026-01-14T21:22:54.021Z | DEBG | test_vpc_firewall (BackgroundTasks): reconfigurator config load complete
background_task = reconfigurator_config_watcher
switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-14T21:22:37.508570Z })
|
| 4364 | 2026-01-14T21:22:54.022Z | DEBG | test_vpc_firewall (BackgroundTasks): activation complete
background_task = reconfigurator_config_watcher
elapsed = 28.881367ms
iteration = 4
status = {"config_updated":false}
|
| 4365 | 2026-01-14T21:22:54.028Z | DEBG | test_vpc_firewall (nexus): default firewall rules for vpc default
rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 569bf9dc-8375-46b0-b51e-4bf610191e7d, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2026-01-14T21:22:54.027769196Z, time_modified: 2026-01-14T21:22:54.027769196Z, time_deleted: None }, vpc_id: e2b55e55-c331-4278-b8fe-0db988ff2f45, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 341f9a27-ae72-47d8-a183-0a86c0b50136, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2026-01-14T21:22:54.027791049Z, time_modified: 2026-01-14T21:22:54.027791049Z, time_deleted: None }, vpc_id: e2b55e55-c331-4278-b8fe-0db988ff2f45, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: d77342cf-74d9-4c43-9655-781e9bdfc909, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2026-01-14T21:22:54.027800418Z, time_modified: 2026-01-14T21:22:54.027800418Z, time_deleted: None }, vpc_id: e2b55e55-c331-4278-b8fe-0db988ff2f45, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp(None))]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
|
| 4366 | 2026-01-14T21:22:54.028Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4367 | 2026-01-14T21:22:54.028Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4368 | 2026-01-14T21:22:54.028Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4369 | 2026-01-14T21:22:54.028Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4370 | 2026-01-14T21:22:54.029Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4371 | 2026-01-14T21:22:54.037Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4372 | 2026-01-14T21:22:54.037Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4373 | 2026-01-14T21:22:54.037Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4374 | 2026-01-14T21:22:54.044Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4375 | 2026-01-14T21:22:54.051Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4376 | 2026-01-14T21:22:54.051Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4377 | 2026-01-14T21:22:54.051Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4378 | 2026-01-14T21:22:54.052Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4379 | 2026-01-14T21:22:54.058Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4380 | 2026-01-14T21:22:54.069Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Modify
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4381 | 2026-01-14T21:22:54.070Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4382 | 2026-01-14T21:22:54.070Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4383 | 2026-01-14T21:22:54.071Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcUpdateFirewall
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4384 | 2026-01-14T21:22:54.191Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N016 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4385 | 2026-01-14T21:22:54.191Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("569bf9dc-8375-46b0-b51e-4bf610191e7d"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-14T21:22:54.027769196Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027769196Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("341f9a27-ae72-47d8-a183-0a86c0b50136"), "name": String("allow-ssh"), "time_created": String("2026-01-14T21:22:54.027791049Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027791049Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("d77342cf-74d9-4c43-9655-781e9bdfc909"), "name": String("allow-icmp"), "time_created": String("2026-01-14T21:22:54.027800418Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027800418Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}])
node_id = 16
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4386 | 2026-01-14T21:22:54.197Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N017 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4387 | 2026-01-14T21:22:54.197Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 17
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4388 | 2026-01-14T21:22:54.202Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4389 | 2026-01-14T21:22:54.203Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4390 | 2026-01-14T21:22:54.203Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4391 | 2026-01-14T21:22:54.203Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4392 | 2026-01-14T21:22:54.204Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4393 | 2026-01-14T21:22:54.213Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4394 | 2026-01-14T21:22:54.213Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4395 | 2026-01-14T21:22:54.213Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4396 | 2026-01-14T21:22:54.214Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4397 | 2026-01-14T21:22:54.220Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4398 | 2026-01-14T21:22:54.220Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4399 | 2026-01-14T21:22:54.220Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4400 | 2026-01-14T21:22:54.221Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4401 | 2026-01-14T21:22:54.228Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4402 | 2026-01-14T21:22:54.242Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4403 | 2026-01-14T21:22:54.242Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4404 | 2026-01-14T21:22:54.242Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4405 | 2026-01-14T21:22:54.243Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4406 | 2026-01-14T21:22:54.249Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4407 | 2026-01-14T21:22:54.249Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4408 | 2026-01-14T21:22:54.250Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4409 | 2026-01-14T21:22:54.256Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4410 | 2026-01-14T21:22:54.256Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4411 | 2026-01-14T21:22:54.257Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4412 | 2026-01-14T21:22:54.407Z | WARN | test_vpc_firewall (SagaExecutor): Default ip pool lookup failed: Object (of type ByOther("default unicast IP pool for current silo")) not found: ip-pool. Default gateway has no ip pool association
authenticated = true
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcCreateGateway
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4413 | 2026-01-14T21:22:54.408Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N017 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4414 | 2026-01-14T21:22:54.408Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("e009feff-2962-49c4-a3ad-f9bca3c65812"), "lookup_type": Object {"ById": String("e009feff-2962-49c4-a3ad-f9bca3c65812")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 17
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4415 | 2026-01-14T21:22:54.417Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N018 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4416 | 2026-01-14T21:22:54.417Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 18
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4417 | 2026-01-14T21:22:54.423Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4418 | 2026-01-14T21:22:54.424Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4419 | 2026-01-14T21:22:54.425Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4420 | 2026-01-14T21:22:54.434Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4421 | 2026-01-14T21:22:54.434Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4422 | 2026-01-14T21:22:54.437Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4423 | 2026-01-14T21:22:54.439Z | INFO | test_vpc_firewall (oximeter-agent): refreshing list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:557
|
| 4424 | 2026-01-14T21:22:54.439Z | DEBG | test_vpc_firewall (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4425 | 2026-01-14T21:22:54.441Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4426 | 2026-01-14T21:22:54.441Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
version = 1.0.0
|
| 4427 | 2026-01-14T21:22:54.441Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4428 | 2026-01-14T21:22:54.441Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4429 | 2026-01-14T21:22:54.443Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4430 | 2026-01-14T21:22:54.444Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4431 | 2026-01-14T21:22:54.444Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4432 | 2026-01-14T21:22:54.445Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4433 | 2026-01-14T21:22:54.450Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ById(b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13) }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4434 | 2026-01-14T21:22:54.450Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4435 | 2026-01-14T21:22:54.450Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4436 | 2026-01-14T21:22:54.450Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4437 | 2026-01-14T21:22:54.451Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4438 | 2026-01-14T21:22:54.454Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 12968
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
|
| 4439 | 2026-01-14T21:22:54.454Z | DEBG | test_vpc_firewall (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "6eff10d0-e17e-4c54-958a-b0255d5de26b", "content-length": "405", "date": "Wed, 14 Jan 2026 21:22:54 GMT"} })
|
| 4440 | 2026-01-14T21:22:54.455Z | DEBG | test_vpc_firewall (oximeter): client request
body = None
method = GET
uri = http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4441 | 2026-01-14T21:22:54.455Z | TRAC | test_vpc_firewall (dropshot_internal): incoming request
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 19059440-4807-4ef1-b7e0-98248b077799
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4442 | 2026-01-14T21:22:54.455Z | DEBG | test_vpc_firewall (dropshot_internal): determined request API version
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 19059440-4807-4ef1-b7e0-98248b077799
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
version = 1.0.0
|
| 4443 | 2026-01-14T21:22:54.456Z | TRAC | test_vpc_firewall (dropshot_internal): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 19059440-4807-4ef1-b7e0-98248b077799
resource = Database
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4444 | 2026-01-14T21:22:54.456Z | DEBG | test_vpc_firewall (dropshot_internal): roles
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 19059440-4807-4ef1-b7e0-98248b077799
roles = RoleSet { roles: {} }
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4445 | 2026-01-14T21:22:54.457Z | DEBG | test_vpc_firewall (dropshot_internal): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. })
authenticated = true
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 19059440-4807-4ef1-b7e0-98248b077799
resource = Database
result = Ok(())
type = user_builtin
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
user_builtin_id = 001de000-05e4-4000-8000-000000000002
|
| 4446 | 2026-01-14T21:22:54.459Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4447 | 2026-01-14T21:22:54.459Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4448 | 2026-01-14T21:22:54.459Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4449 | 2026-01-14T21:22:54.460Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4450 | 2026-01-14T21:22:54.465Z | INFO | test_vpc_firewall (dropshot_internal): request completed
latency_us = 9765
local_addr = 127.0.0.1:45286
method = GET
remote_addr = 127.0.0.1:58081
req_id = 19059440-4807-4ef1-b7e0-98248b077799
response_code = 200
uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
|
| 4451 | 2026-01-14T21:22:54.466Z | DEBG | test_vpc_firewall (oximeter): client response
result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "19059440-4807-4ef1-b7e0-98248b077799", "content-length": "29", "date": "Wed, 14 Jan 2026 21:22:54 GMT"} })
|
| 4452 | 2026-01-14T21:22:54.466Z | TRAC | test_vpc_firewall (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4453 | 2026-01-14T21:22:54.466Z | DEBG | test_vpc_firewall (oximeter-agent): registered new metric producer
address = [::1]:39192
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
|
| 4454 | 2026-01-14T21:22:54.466Z | INFO | test_vpc_firewall (oximeter-agent): refreshed list of producers from Nexus
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
file = oximeter/collector/src/agent.rs:632
n_current_tasks = 2
n_pruned_tasks = 0
|
| 4455 | 2026-01-14T21:22:54.533Z | TRAC | test_vpc_firewall (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4456 | 2026-01-14T21:22:54.534Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4457 | 2026-01-14T21:22:54.534Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4458 | 2026-01-14T21:22:54.534Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4459 | 2026-01-14T21:22:54.535Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4460 | 2026-01-14T21:22:54.537Z | DEBG | test_vpc_firewall (collection-task): reporting oximeter self-collection statistics
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4461 | 2026-01-14T21:22:54.538Z | DEBG | test_vpc_firewall (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4462 | 2026-01-14T21:22:54.539Z | DEBG | test_vpc_firewall (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4463 | 2026-01-14T21:22:54.542Z | TRAC | test_vpc_firewall (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4464 | 2026-01-14T21:22:54.544Z | DEBG | test_vpc_firewall (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4465 | 2026-01-14T21:22:54.544Z | TRAC | test_vpc_firewall (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4466 | 2026-01-14T21:22:54.544Z | TRAC | test_vpc_firewall (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4467 | 2026-01-14T21:22:54.547Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4468 | 2026-01-14T21:22:54.557Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ById(b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13) }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4469 | 2026-01-14T21:22:54.557Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ById(b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13) }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4470 | 2026-01-14T21:22:54.557Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4471 | 2026-01-14T21:22:54.557Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4472 | 2026-01-14T21:22:54.557Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4473 | 2026-01-14T21:22:54.558Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4474 | 2026-01-14T21:22:54.578Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4475 | 2026-01-14T21:22:54.579Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4476 | 2026-01-14T21:22:54.579Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4477 | 2026-01-14T21:22:54.580Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4478 | 2026-01-14T21:22:54.588Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4479 | 2026-01-14T21:22:54.588Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4480 | 2026-01-14T21:22:54.588Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4481 | 2026-01-14T21:22:54.589Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4482 | 2026-01-14T21:22:54.597Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4483 | 2026-01-14T21:22:54.608Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = ListChildren
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ById(b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13) }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4484 | 2026-01-14T21:22:54.608Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4485 | 2026-01-14T21:22:54.608Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4486 | 2026-01-14T21:22:54.608Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4487 | 2026-01-14T21:22:54.616Z | DEBG | test_vpc_firewall (results-sink): inserting 2 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4488 | 2026-01-14T21:22:54.616Z | DEBG | test_vpc_firewall (results-sink-cluster): inserting 2 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4489 | 2026-01-14T21:22:54.616Z | DEBG | test_vpc_firewall (clickhouse-client): unrolling 2 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4490 | 2026-01-14T21:22:54.618Z | DEBG | test_vpc_firewall (clickhouse-client): retrieving timeseries schema from database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4491 | 2026-01-14T21:22:54.618Z | TRAC | test_vpc_firewall (clickhouse-client): executing SQL query
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
|
| 4492 | 2026-01-14T21:22:54.626Z | TRAC | test_vpc_firewall (clickhouse-client): no new timeseries schema in database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4493 | 2026-01-14T21:22:54.626Z | DEBG | test_vpc_firewall (clickhouse-client): new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
schema = TimeseriesSchema { timeseries_name: TimeseriesName("integration_target:integration_metric"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "metric_name", field_type: String, source: Metric, description: "" }, FieldSchema { name: "target_name", field_type: String, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:54.618583616Z }
timeseries_name = integration_target:integration_metric
|
| 4494 | 2026-01-14T21:22:54.626Z | DEBG | test_vpc_firewall (clickhouse-client): inserting 1 new timeseries schema
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4495 | 2026-01-14T21:22:54.627Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 6
n_rows = 1
sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
|
| 4496 | 2026-01-14T21:22:54.635Z | DEBG | test_vpc_firewall (nexus): resolved names for firewall rules
instance_interfaces = {}
subnet_interfaces = {}
subnet_networks = {}
vpc_interfaces = {}
|
| 4497 | 2026-01-14T21:22:54.635Z | DEBG | test_vpc_firewall (nexus): resolved firewall rules for sled agents
sled_agent_rules = []
|
| 4498 | 2026-01-14T21:22:54.635Z | DEBG | test_vpc_firewall (nexus): resolved 0 rules for sleds
|
| 4499 | 2026-01-14T21:22:54.639Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
|
| 4500 | 2026-01-14T21:22:54.648Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 2
table_name = fields_ipaddr
|
| 4501 | 2026-01-14T21:22:54.648Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 3
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
| 4502 | 2026-01-14T21:22:54.656Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 3
table_name = fields_string
|
| 4503 | 2026-01-14T21:22:54.657Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_u16 FORMAT Native
|
| 4504 | 2026-01-14T21:22:54.669Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 2
table_name = fields_u16
|
| 4505 | 2026-01-14T21:22:54.669Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_uuid FORMAT Native
|
| 4506 | 2026-01-14T21:22:54.675Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 2
table_name = fields_uuid
|
| 4507 | 2026-01-14T21:22:54.675Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 5
n_rows = 1
sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
|
| 4508 | 2026-01-14T21:22:54.679Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 1
table_name = measurements_cumulativeu64
|
| 4509 | 2026-01-14T21:22:54.679Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
| 4510 | 2026-01-14T21:22:54.682Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 1
table_name = measurements_i64
|
| 4511 | 2026-01-14T21:22:54.684Z | TRAC | test_vpc_firewall (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4512 | 2026-01-14T21:22:54.717Z | WARN | test_vpc_firewall (results-sink-cluster): failed to insert some results into metric DB
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
error = Failed to check out connection to database: No backends found for this service
file = oximeter/collector/src/results_sink.rs:92
|
| 4513 | 2026-01-14T21:22:54.776Z | DEBG | test_vpc_firewall (nexus): resolved sleds for vpc default
vpc_to_sled = []
|
| 4514 | 2026-01-14T21:22:54.777Z | DEBG | test_vpc_firewall (nexus): sending firewall rules to sled agents
|
| 4515 | 2026-01-14T21:22:54.777Z | INFO | test_vpc_firewall (nexus): updated firewall rules on 0 sleds
|
| 4516 | 2026-01-14T21:22:54.777Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4517 | 2026-01-14T21:22:54.777Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4518 | 2026-01-14T21:22:54.779Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_node = VpcNotifySleds
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4519 | 2026-01-14T21:22:54.787Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N018 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4520 | 2026-01-14T21:22:54.787Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 18
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4521 | 2026-01-14T21:22:54.793Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N019 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4522 | 2026-01-14T21:22:54.794Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 19
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4523 | 2026-01-14T21:22:54.804Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N019 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4524 | 2026-01-14T21:22:54.804Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 19
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4525 | 2026-01-14T21:22:54.820Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N021 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4526 | 2026-01-14T21:22:54.821Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 21
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4527 | 2026-01-14T21:22:54.828Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N021 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4528 | 2026-01-14T21:22:54.828Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 21
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4529 | 2026-01-14T21:22:54.833Z | INFO | test_vpc_firewall (SEC): update for saga cached state
new_state = Done
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4530 | 2026-01-14T21:22:54.833Z | INFO | test_vpc_firewall (SecStore): updating state
new_state = done
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4531 | 2026-01-14T21:22:54.899Z | INFO | test_vpc_firewall (SEC): saga finished
result = success
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4532 | 2026-01-14T21:22:54.899Z | INFO | test_vpc_firewall (SagaQuiesceHandle): tracked saga has finished
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
|
| 4533 | 2026-01-14T21:22:54.900Z | INFO | test_vpc_firewall (SagaExecutor): saga finished
saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
saga_name = project-create
saga_result = SagaResult { saga_id: b7f45611-f4a9-45cb-afab-fa043fabf560, saga_log: SagaLog { saga_id: b7f45611-f4a9-45cb-afab-fa043fabf560, unwinding: false, events: [N020 started, N020 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N021 started, N021 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "name": String("springfield-squidport"), "time_created": String("2026-01-14T21:22:53.330230Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.330230Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd80:d618:53ef::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("e2b55e55-c331-4278-b8fe-0db988ff2f45")), 4: Succeeded(String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")), 5: Succeeded(String("183f06e0-c10f-44bb-960e-f856b4d0f52f")), 6: Succeeded(String("5b8dc003-44ca-4ade-bbff-62be25d55e7b")), 7: Succeeded(String("3e0c50f0-4bf2-444c-ad00-81c6efae5752")), 8: Succeeded(String("fb758050-22b5-4004-83d0-0eab561238d6")), 9: Succeeded(String("e009feff-2962-49c4-a3ad-f9bca3c65812")), 10: Succeeded(Array [Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.508432Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.508432Z")}, "ipv6_prefix": String("fd80:d618:53ef::/48"), "project_id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "subnet_gen": Number(1), "system_router_id": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "vni": Number(3604191)}]), 11: Succeeded(Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Array [Object {"key": String("fb758050-22b5-4004-83d0-0eab561238d6"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("fb758050-22b5-4004-83d0-0eab561238d6"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.885181Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.885181Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd80:d618:53ef::/64"), "rcgen": Number(1), "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}]), 15: Succeeded(Object {"key": String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 16: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("569bf9dc-8375-46b0-b51e-4bf610191e7d"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-14T21:22:54.027769196Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027769196Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("341f9a27-ae72-47d8-a183-0a86c0b50136"), "name": String("allow-ssh"), "time_created": String("2026-01-14T21:22:54.027791049Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027791049Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("d77342cf-74d9-4c43-9655-781e9bdfc909"), "name": String("allow-icmp"), "time_created": String("2026-01-14T21:22:54.027800418Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027800418Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}]), 17: Succeeded(Object {"key": String("e009feff-2962-49c4-a3ad-f9bca3c65812"), "lookup_type": Object {"ById": String("e009feff-2962-49c4-a3ad-f9bca3c65812")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 18: Succeeded(Null), 19: Succeeded(Null), 20: Succeeded(Null), 21: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("e009feff-2962-49c4-a3ad-f9bca3c65812"), "default_subnet_id": String("fb758050-22b5-4004-83d0-0eab561238d6"), "default_v4_route_id": String("183f06e0-c10f-44bb-960e-f856b4d0f52f"), "default_v6_route_id": String("5b8dc003-44ca-4ade-bbff-62be25d55e7b"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("569bf9dc-8375-46b0-b51e-4bf610191e7d"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-14T21:22:54.027769196Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027769196Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("341f9a27-ae72-47d8-a183-0a86c0b50136"), "name": String("allow-ssh"), "time_created": String("2026-01-14T21:22:54.027791049Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027791049Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("d77342cf-74d9-4c43-9655-781e9bdfc909"), "name": String("allow-icmp"), "time_created": String("2026-01-14T21:22:54.027800418Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027800418Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}], "gateway": Object {"key": String("e009feff-2962-49c4-a3ad-f9bca3c65812"), "lookup_type": Object {"ById": String("e009feff-2962-49c4-a3ad-f9bca3c65812")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "name": String("springfield-squidport"), "time_created": String("2026-01-14T21:22:53.330230Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.330230Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route": Object {"key": String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("fb758050-22b5-4004-83d0-0eab561238d6"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("fb758050-22b5-4004-83d0-0eab561238d6"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.885181Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.885181Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd80:d618:53ef::/64"), "rcgen": Number(1), "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}], "subnet_route_id": String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"), "system_router_id": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd80:d618:53ef::/48"), "name": String("default")}}, "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")} }) }
|
| 4534 | 2026-01-14T21:22:54.901Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = AuditLog
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4535 | 2026-01-14T21:22:54.901Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4536 | 2026-01-14T21:22:54.902Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4537 | 2026-01-14T21:22:54.902Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4538 | 2026-01-14T21:22:54.902Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4539 | 2026-01-14T21:22:54.908Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4540 | 2026-01-14T21:22:54.913Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = AuditLog
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4541 | 2026-01-14T21:22:54.914Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4542 | 2026-01-14T21:22:54.914Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4543 | 2026-01-14T21:22:54.914Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/projects
|
| 4544 | 2026-01-14T21:22:54.985Z | INFO | test_vpc_firewall (dropshot_external): request completed
latency_us = 2416546
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b
response_code = 201
uri = /v1/projects
|
| 4545 | 2026-01-14T21:22:54.988Z | INFO | test_vpc_firewall (external client test context): client received response
status = 201
|
| 4546 | 2026-01-14T21:22:54.988Z | INFO | test_vpc_firewall (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:43638/v1/vpcs/default?project=springfield-squidport
|
| 4547 | 2026-01-14T21:22:54.989Z | TRAC | test_vpc_firewall (dropshot_external): incoming request
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4548 | 2026-01-14T21:22:54.989Z | DEBG | test_vpc_firewall (dropshot_external): determined request API version
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
uri = /v1/vpcs/default?project=springfield-squidport
version = 2025121200.0.0
|
| 4549 | 2026-01-14T21:22:54.989Z | TRAC | test_vpc_firewall (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4550 | 2026-01-14T21:22:54.989Z | DEBG | test_vpc_firewall (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4551 | 2026-01-14T21:22:54.989Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4552 | 2026-01-14T21:22:54.989Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4553 | 2026-01-14T21:22:54.990Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4554 | 2026-01-14T21:22:54.996Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4555 | 2026-01-14T21:22:54.996Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4556 | 2026-01-14T21:22:54.998Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4557 | 2026-01-14T21:22:55.004Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
| 4558 | 2026-01-14T21:22:55.005Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4559 | 2026-01-14T21:22:55.005Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4560 | 2026-01-14T21:22:55.005Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4561 | 2026-01-14T21:22:55.006Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4562 | 2026-01-14T21:22:55.011Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4563 | 2026-01-14T21:22:55.011Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4564 | 2026-01-14T21:22:55.011Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4565 | 2026-01-14T21:22:55.012Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4566 | 2026-01-14T21:22:55.018Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4567 | 2026-01-14T21:22:55.022Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
| 4568 | 2026-01-14T21:22:55.022Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4569 | 2026-01-14T21:22:55.022Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4570 | 2026-01-14T21:22:55.022Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4571 | 2026-01-14T21:22:55.027Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
| 4572 | 2026-01-14T21:22:55.027Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4573 | 2026-01-14T21:22:55.027Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4574 | 2026-01-14T21:22:55.027Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4575 | 2026-01-14T21:22:55.028Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4576 | 2026-01-14T21:22:55.034Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4577 | 2026-01-14T21:22:55.034Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4578 | 2026-01-14T21:22:55.034Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4579 | 2026-01-14T21:22:55.035Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4580 | 2026-01-14T21:22:55.039Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4581 | 2026-01-14T21:22:55.043Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
| 4582 | 2026-01-14T21:22:55.044Z | TRAC | test_vpc_firewall (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4583 | 2026-01-14T21:22:55.044Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4584 | 2026-01-14T21:22:55.044Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4585 | 2026-01-14T21:22:55.044Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4586 | 2026-01-14T21:22:55.049Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4587 | 2026-01-14T21:22:55.049Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4588 | 2026-01-14T21:22:55.051Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4589 | 2026-01-14T21:22:55.057Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4590 | 2026-01-14T21:22:55.058Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4591 | 2026-01-14T21:22:55.059Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4592 | 2026-01-14T21:22:55.065Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4593 | 2026-01-14T21:22:55.065Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4594 | 2026-01-14T21:22:55.065Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4595 | 2026-01-14T21:22:55.065Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4596 | 2026-01-14T21:22:55.066Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4597 | 2026-01-14T21:22:55.072Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4598 | 2026-01-14T21:22:55.072Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4599 | 2026-01-14T21:22:55.072Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4600 | 2026-01-14T21:22:55.074Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4601 | 2026-01-14T21:22:55.081Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4602 | 2026-01-14T21:22:55.081Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4603 | 2026-01-14T21:22:55.081Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4604 | 2026-01-14T21:22:55.082Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4605 | 2026-01-14T21:22:55.090Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4606 | 2026-01-14T21:22:55.101Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4607 | 2026-01-14T21:22:55.101Z | INFO | test_vpc_firewall (dropshot_external): request completed
latency_us = 112776
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7
response_code = 200
uri = /v1/vpcs/default?project=springfield-squidport
|
| 4608 | 2026-01-14T21:22:55.102Z | INFO | test_vpc_firewall (external client test context): client received response
status = 200
|
| 4609 | 2026-01-14T21:22:55.103Z | INFO | test_vpc_firewall (external client test context): client request
body = Body { inner: BoxBody }
method = GET
uri = http://127.0.0.1:43638/v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4610 | 2026-01-14T21:22:55.104Z | TRAC | test_vpc_firewall (dropshot_external): incoming request
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4611 | 2026-01-14T21:22:55.104Z | DEBG | test_vpc_firewall (dropshot_external): determined request API version
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
version = 2025121200.0.0
|
| 4612 | 2026-01-14T21:22:55.104Z | TRAC | test_vpc_firewall (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4613 | 2026-01-14T21:22:55.104Z | DEBG | test_vpc_firewall (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4614 | 2026-01-14T21:22:55.104Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4615 | 2026-01-14T21:22:55.104Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4616 | 2026-01-14T21:22:55.105Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4617 | 2026-01-14T21:22:55.112Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4618 | 2026-01-14T21:22:55.112Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4619 | 2026-01-14T21:22:55.113Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4620 | 2026-01-14T21:22:55.133Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
| 4621 | 2026-01-14T21:22:55.133Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4622 | 2026-01-14T21:22:55.133Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4623 | 2026-01-14T21:22:55.133Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4624 | 2026-01-14T21:22:55.134Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4625 | 2026-01-14T21:22:55.139Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4626 | 2026-01-14T21:22:55.139Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4627 | 2026-01-14T21:22:55.140Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4628 | 2026-01-14T21:22:55.141Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4629 | 2026-01-14T21:22:55.147Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4630 | 2026-01-14T21:22:55.152Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
| 4631 | 2026-01-14T21:22:55.152Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4632 | 2026-01-14T21:22:55.152Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4633 | 2026-01-14T21:22:55.153Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4634 | 2026-01-14T21:22:55.158Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
| 4635 | 2026-01-14T21:22:55.158Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4636 | 2026-01-14T21:22:55.158Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4637 | 2026-01-14T21:22:55.158Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4638 | 2026-01-14T21:22:55.159Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4639 | 2026-01-14T21:22:55.164Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4640 | 2026-01-14T21:22:55.164Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4641 | 2026-01-14T21:22:55.164Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4642 | 2026-01-14T21:22:55.165Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4643 | 2026-01-14T21:22:55.175Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4644 | 2026-01-14T21:22:55.175Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
| 4645 | 2026-01-14T21:22:55.175Z | TRAC | test_vpc_firewall (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4646 | 2026-01-14T21:22:55.175Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4647 | 2026-01-14T21:22:55.175Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4648 | 2026-01-14T21:22:55.176Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4649 | 2026-01-14T21:22:55.182Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4650 | 2026-01-14T21:22:55.182Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4651 | 2026-01-14T21:22:55.182Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4652 | 2026-01-14T21:22:55.188Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4653 | 2026-01-14T21:22:55.188Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4654 | 2026-01-14T21:22:55.190Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4655 | 2026-01-14T21:22:55.195Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4656 | 2026-01-14T21:22:55.196Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4657 | 2026-01-14T21:22:55.196Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4658 | 2026-01-14T21:22:55.196Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4659 | 2026-01-14T21:22:55.197Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4660 | 2026-01-14T21:22:55.207Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4661 | 2026-01-14T21:22:55.207Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4662 | 2026-01-14T21:22:55.207Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4663 | 2026-01-14T21:22:55.208Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4664 | 2026-01-14T21:22:55.214Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4665 | 2026-01-14T21:22:55.214Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4666 | 2026-01-14T21:22:55.215Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4667 | 2026-01-14T21:22:55.217Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4668 | 2026-01-14T21:22:55.224Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4669 | 2026-01-14T21:22:55.237Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4670 | 2026-01-14T21:22:55.237Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4671 | 2026-01-14T21:22:55.237Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4672 | 2026-01-14T21:22:55.237Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4673 | 2026-01-14T21:22:55.237Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4674 | 2026-01-14T21:22:55.238Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4675 | 2026-01-14T21:22:55.245Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4676 | 2026-01-14T21:22:55.245Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4677 | 2026-01-14T21:22:55.245Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4678 | 2026-01-14T21:22:55.246Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4679 | 2026-01-14T21:22:55.251Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4680 | 2026-01-14T21:22:55.251Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4681 | 2026-01-14T21:22:55.252Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4682 | 2026-01-14T21:22:55.252Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4683 | 2026-01-14T21:22:55.259Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4684 | 2026-01-14T21:22:55.269Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Read
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4685 | 2026-01-14T21:22:55.269Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4686 | 2026-01-14T21:22:55.269Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4687 | 2026-01-14T21:22:55.270Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4688 | 2026-01-14T21:22:55.277Z | INFO | test_vpc_firewall (dropshot_external): request completed
latency_us = 173484
local_addr = 127.0.0.1:43638
method = GET
remote_addr = 127.0.0.1:64367
req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d
response_code = 200
uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
|
| 4689 | 2026-01-14T21:22:55.278Z | INFO | test_vpc_firewall (external client test context): client received response
status = 200
|
| 4690 | 2026-01-14T21:22:55.279Z | INFO | test_vpc_firewall (external client test context): client request
body = Body { inner: BoxBody }
method = POST
uri = http://127.0.0.1:43638/v1/vpcs?project=springfield-squidport
|
| 4691 | 2026-01-14T21:22:55.279Z | TRAC | test_vpc_firewall (dropshot_external): incoming request
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
uri = /v1/vpcs?project=springfield-squidport
|
| 4692 | 2026-01-14T21:22:55.279Z | DEBG | test_vpc_firewall (dropshot_external): determined request API version
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
uri = /v1/vpcs?project=springfield-squidport
version = 2025121200.0.0
|
| 4693 | 2026-01-14T21:22:55.280Z | TRAC | test_vpc_firewall (dropshot_external): authn: trying SchemeName("spoof")
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
uri = /v1/vpcs?project=springfield-squidport
|
| 4694 | 2026-01-14T21:22:55.280Z | DEBG | test_vpc_firewall (dropshot_external): looking up silo for user
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
silo_user_id = 001de000-05e4-4000-8000-000000004007
uri = /v1/vpcs?project=springfield-squidport
|
| 4695 | 2026-01-14T21:22:55.280Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4696 | 2026-01-14T21:22:55.280Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4697 | 2026-01-14T21:22:55.281Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4698 | 2026-01-14T21:22:55.286Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4699 | 2026-01-14T21:22:55.286Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4700 | 2026-01-14T21:22:55.288Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4701 | 2026-01-14T21:22:55.293Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
|
| 4702 | 2026-01-14T21:22:55.293Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4703 | 2026-01-14T21:22:55.293Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4704 | 2026-01-14T21:22:55.293Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4705 | 2026-01-14T21:22:55.294Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4706 | 2026-01-14T21:22:55.305Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4707 | 2026-01-14T21:22:55.305Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4708 | 2026-01-14T21:22:55.306Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4709 | 2026-01-14T21:22:55.311Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4710 | 2026-01-14T21:22:55.321Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4711 | 2026-01-14T21:22:55.327Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
result = Ok(())
|
| 4712 | 2026-01-14T21:22:55.327Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4713 | 2026-01-14T21:22:55.328Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4714 | 2026-01-14T21:22:55.328Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4715 | 2026-01-14T21:22:55.335Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
|
| 4716 | 2026-01-14T21:22:55.335Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
|
| 4717 | 2026-01-14T21:22:55.335Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4718 | 2026-01-14T21:22:55.335Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4719 | 2026-01-14T21:22:55.336Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4720 | 2026-01-14T21:22:55.341Z | TRAC | test_vpc_firewall (ExternalAuthn): loading roles
actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
|
| 4721 | 2026-01-14T21:22:55.341Z | TRAC | test_vpc_firewall (ExternalAuthn): authorize begin
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
|
| 4722 | 2026-01-14T21:22:55.341Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {} }
|
| 4723 | 2026-01-14T21:22:55.342Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Query
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Database
result = Ok(())
|
| 4724 | 2026-01-14T21:22:55.350Z | DEBG | test_vpc_firewall (ExternalAuthn): roles
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
|
| 4725 | 2026-01-14T21:22:55.355Z | DEBG | test_vpc_firewall (ExternalAuthn): authorize result
action = Read
actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. })
resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
result = Ok(())
|
| 4726 | 2026-01-14T21:22:55.355Z | TRAC | test_vpc_firewall (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] })
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
uri = /v1/vpcs?project=springfield-squidport
|
| 4727 | 2026-01-14T21:22:55.355Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4728 | 2026-01-14T21:22:55.355Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4729 | 2026-01-14T21:22:55.355Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4730 | 2026-01-14T21:22:55.359Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4731 | 2026-01-14T21:22:55.359Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4732 | 2026-01-14T21:22:55.360Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4733 | 2026-01-14T21:22:55.365Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4734 | 2026-01-14T21:22:55.365Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4735 | 2026-01-14T21:22:55.365Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4736 | 2026-01-14T21:22:55.365Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4737 | 2026-01-14T21:22:55.366Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4738 | 2026-01-14T21:22:55.371Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4739 | 2026-01-14T21:22:55.372Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4740 | 2026-01-14T21:22:55.372Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4741 | 2026-01-14T21:22:55.373Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4742 | 2026-01-14T21:22:55.380Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4743 | 2026-01-14T21:22:55.380Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4744 | 2026-01-14T21:22:55.389Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4745 | 2026-01-14T21:22:55.389Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4746 | 2026-01-14T21:22:55.395Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4747 | 2026-01-14T21:22:55.409Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4748 | 2026-01-14T21:22:55.409Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = VpcList(Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") })
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4749 | 2026-01-14T21:22:55.410Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4750 | 2026-01-14T21:22:55.410Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4751 | 2026-01-14T21:22:55.410Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4752 | 2026-01-14T21:22:55.411Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4753 | 2026-01-14T21:22:55.418Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4754 | 2026-01-14T21:22:55.418Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4755 | 2026-01-14T21:22:55.419Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4756 | 2026-01-14T21:22:55.419Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4757 | 2026-01-14T21:22:55.425Z | TRAC | test_vpc_firewall (dropshot_external): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4758 | 2026-01-14T21:22:55.425Z | TRAC | test_vpc_firewall (dropshot_external): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4759 | 2026-01-14T21:22:55.425Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4760 | 2026-01-14T21:22:55.426Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = Database
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4761 | 2026-01-14T21:22:55.432Z | DEBG | test_vpc_firewall (dropshot_external): roles
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4762 | 2026-01-14T21:22:55.439Z | DEBG | test_vpc_firewall (dropshot_external): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
local_addr = 127.0.0.1:43638
method = POST
remote_addr = 127.0.0.1:64367
req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f
resource = VpcList(Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") })
result = Ok(())
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
uri = /v1/vpcs?project=springfield-squidport
|
| 4763 | 2026-01-14T21:22:55.439Z | INFO | test_vpc_firewall (SagaQuiesceHandle): tracking newly created saga
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4764 | 2026-01-14T21:22:55.439Z | INFO | test_vpc_firewall (SagaExecutor): preparing saga
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
|
| 4765 | 2026-01-14T21:22:55.440Z | INFO | test_vpc_firewall (SEC): saga create
dag = {"end_node":17,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[16,0,null],[15,17,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"Start":{"params":{"authz_project":{"key":"b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13","lookup_type":{"ByName":"springfield-squidport"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}},"device_token_expiration":null},{"mapped_fleet_roles":{}}]}},"vpc_create":{"description":"vpc description","dns_name":"abc","ipv6_prefix":null,"name":"second-vpc"}}}},"End"]},"saga_name":"vpc-create","start_node":16}
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4766 | 2026-01-14T21:22:55.440Z | INFO | test_vpc_firewall (SecStore): creating saga
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
|
| 4767 | 2026-01-14T21:22:55.467Z | DEBG | test_vpc_firewall (collection-task): sent timer-based collection request to the collection task
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4768 | 2026-01-14T21:22:55.467Z | DEBG | test_vpc_firewall (collection-task): collecting from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4769 | 2026-01-14T21:22:55.471Z | TRAC | test_vpc_firewall (collection-task): sent collection request to producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4770 | 2026-01-14T21:22:55.472Z | DEBG | test_vpc_firewall (collection-task): collected results from producer
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
n_results = 1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4771 | 2026-01-14T21:22:55.472Z | TRAC | test_vpc_firewall (collection-task): forwarded results to main collection loop
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4772 | 2026-01-14T21:22:55.473Z | TRAC | test_vpc_firewall (collection-task): top of inner collection loop, waiting for next request
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
producer_id = a6458b7d-87c3-4483-be96-854d814c20de
producer_ip = ::1
producer_port = 39192
|
| 4773 | 2026-01-14T21:22:55.520Z | INFO | test_vpc_firewall (SagaExecutor): starting saga
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
|
| 4774 | 2026-01-14T21:22:55.521Z | INFO | test_vpc_firewall (SEC): saga start
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4775 | 2026-01-14T21:22:55.521Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N016 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4776 | 2026-01-14T21:22:55.521Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 16
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4777 | 2026-01-14T21:22:55.529Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N016 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4778 | 2026-01-14T21:22:55.529Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 16
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4779 | 2026-01-14T21:22:55.537Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N000 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4780 | 2026-01-14T21:22:55.538Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 0
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4781 | 2026-01-14T21:22:55.543Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N000 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4782 | 2026-01-14T21:22:55.543Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("6fed4476-e17d-4fb5-9302-d01707840fb5"))
node_id = 0
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4783 | 2026-01-14T21:22:55.548Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N001 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4784 | 2026-01-14T21:22:55.548Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 1
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4785 | 2026-01-14T21:22:55.554Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N001 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4786 | 2026-01-14T21:22:55.559Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("b41a4399-83be-4b0e-8058-6d6a8ee1717b"))
node_id = 1
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4787 | 2026-01-14T21:22:55.567Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N002 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4788 | 2026-01-14T21:22:55.567Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 2
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4789 | 2026-01-14T21:22:55.576Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N002 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4790 | 2026-01-14T21:22:55.576Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("51492747-fc37-4fa3-90bb-7490f6d8bd0d"))
node_id = 2
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4791 | 2026-01-14T21:22:55.593Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N003 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4792 | 2026-01-14T21:22:55.593Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 3
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4793 | 2026-01-14T21:22:55.616Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N003 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4794 | 2026-01-14T21:22:55.616Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("88a08621-e288-4ab7-91e3-c239a412ee8e"))
node_id = 3
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4795 | 2026-01-14T21:22:55.618Z | DEBG | test_vpc_firewall (results-sink): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4796 | 2026-01-14T21:22:55.619Z | DEBG | test_vpc_firewall (results-sink-cluster): inserting 1 samples into database
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4797 | 2026-01-14T21:22:55.619Z | DEBG | test_vpc_firewall (clickhouse-client): unrolling 1 total samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
|
| 4798 | 2026-01-14T21:22:55.620Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 2
sql = INSERT INTO oximeter.fields_string FORMAT Native
|
| 4799 | 2026-01-14T21:22:55.625Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N004 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4800 | 2026-01-14T21:22:55.625Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 4
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4801 | 2026-01-14T21:22:55.631Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 2
table_name = fields_string
|
| 4802 | 2026-01-14T21:22:55.631Z | TRAC | test_vpc_firewall (clickhouse-client): inserting data
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_columns = 4
n_rows = 1
sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
|
| 4803 | 2026-01-14T21:22:55.639Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N004 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4804 | 2026-01-14T21:22:55.639Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("106604e5-ccae-44af-85f8-9e44c7e16611"))
node_id = 4
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4805 | 2026-01-14T21:22:55.644Z | DEBG | test_vpc_firewall (clickhouse-client): inserted rows into table
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
n_rows = 1
table_name = measurements_i64
|
| 4806 | 2026-01-14T21:22:55.644Z | TRAC | test_vpc_firewall (results-sink): successfully inserted samples
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
|
| 4807 | 2026-01-14T21:22:55.650Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N005 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4808 | 2026-01-14T21:22:55.650Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 5
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4809 | 2026-01-14T21:22:55.656Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N005 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4810 | 2026-01-14T21:22:55.656Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("87e5d9ed-f859-4592-a712-8e29898c5130"))
node_id = 5
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4811 | 2026-01-14T21:22:55.666Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N006 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4812 | 2026-01-14T21:22:55.666Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 6
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4813 | 2026-01-14T21:22:55.678Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N006 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4814 | 2026-01-14T21:22:55.678Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(String("e9b958da-5bdb-4bba-812e-ef921a9dd910"))
node_id = 6
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4815 | 2026-01-14T21:22:55.690Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N007 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4816 | 2026-01-14T21:22:55.690Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 7
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4817 | 2026-01-14T21:22:55.699Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4818 | 2026-01-14T21:22:55.700Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4819 | 2026-01-14T21:22:55.700Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4820 | 2026-01-14T21:22:55.700Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4821 | 2026-01-14T21:22:55.701Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4822 | 2026-01-14T21:22:55.719Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4823 | 2026-01-14T21:22:55.719Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4824 | 2026-01-14T21:22:55.719Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4825 | 2026-01-14T21:22:55.719Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4826 | 2026-01-14T21:22:55.721Z | WARN | test_vpc_firewall (results-sink-cluster): failed to insert some results into metric DB
collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
collector_ip = ::1
error = Failed to check out connection to database: No backends found for this service
file = oximeter/collector/src/results_sink.rs:92
|
| 4827 | 2026-01-14T21:22:55.727Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4828 | 2026-01-14T21:22:55.727Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4829 | 2026-01-14T21:22:55.727Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4830 | 2026-01-14T21:22:55.728Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4831 | 2026-01-14T21:22:55.739Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4832 | 2026-01-14T21:22:55.749Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4833 | 2026-01-14T21:22:55.749Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4834 | 2026-01-14T21:22:55.749Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4835 | 2026-01-14T21:22:55.750Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateVpc
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4836 | 2026-01-14T21:22:55.760Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N007 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4837 | 2026-01-14T21:22:55.760Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Array [Object {"key": String("6fed4476-e17d-4fb5-9302-d01707840fb5"), "lookup_type": Object {"ByName": String("second-vpc")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("abc"), "firewall_gen": Number(1), "identity": Object {"description": String("vpc description"), "id": String("6fed4476-e17d-4fb5-9302-d01707840fb5"), "name": String("second-vpc"), "time_created": String("2026-01-14T21:22:55.699765Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:55.699765Z")}, "ipv6_prefix": String("fdef:491f:9a4e::/48"), "project_id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "subnet_gen": Number(1), "system_router_id": String("b41a4399-83be-4b0e-8058-6d6a8ee1717b"), "vni": Number(2190405)}])
node_id = 7
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4838 | 2026-01-14T21:22:55.766Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N008 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4839 | 2026-01-14T21:22:55.767Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 8
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4840 | 2026-01-14T21:22:55.774Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: 6fed4476-e17d-4fb5-9302-d01707840fb5, lookup_type: ByName("second-vpc") }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4841 | 2026-01-14T21:22:55.774Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4842 | 2026-01-14T21:22:55.774Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4843 | 2026-01-14T21:22:55.774Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4844 | 2026-01-14T21:22:55.776Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4845 | 2026-01-14T21:22:55.783Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4846 | 2026-01-14T21:22:55.783Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4847 | 2026-01-14T21:22:55.783Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4848 | 2026-01-14T21:22:55.784Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4849 | 2026-01-14T21:22:55.789Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4850 | 2026-01-14T21:22:55.790Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4851 | 2026-01-14T21:22:55.790Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4852 | 2026-01-14T21:22:55.791Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4853 | 2026-01-14T21:22:55.798Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4854 | 2026-01-14T21:22:55.809Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: 6fed4476-e17d-4fb5-9302-d01707840fb5, lookup_type: ByName("second-vpc") }
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4855 | 2026-01-14T21:22:55.810Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4856 | 2026-01-14T21:22:55.810Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4857 | 2026-01-14T21:22:55.810Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateRouter
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4858 | 2026-01-14T21:22:55.817Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N008 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4859 | 2026-01-14T21:22:55.818Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Object {"key": String("b41a4399-83be-4b0e-8058-6d6a8ee1717b"), "lookup_type": Object {"ById": String("b41a4399-83be-4b0e-8058-6d6a8ee1717b")}, "parent": Object {"key": String("6fed4476-e17d-4fb5-9302-d01707840fb5"), "lookup_type": Object {"ByName": String("second-vpc")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}})
node_id = 8
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4860 | 2026-01-14T21:22:55.825Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N009 started
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4861 | 2026-01-14T21:22:55.825Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Started
node_id = 9
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|
| 4862 | 2026-01-14T21:22:55.834Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: 6fed4476-e17d-4fb5-9302-d01707840fb5, lookup_type: ByName("second-vpc") }, key: b41a4399-83be-4b0e-8058-6d6a8ee1717b, lookup_type: ById(b41a4399-83be-4b0e-8058-6d6a8ee1717b) }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4863 | 2026-01-14T21:22:55.834Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13
resource_type = Project
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4864 | 2026-01-14T21:22:55.834Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4865 | 2026-01-14T21:22:55.834Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4866 | 2026-01-14T21:22:55.836Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4867 | 2026-01-14T21:22:55.842Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-5110-4000-8000-000000000000
resource_type = Silo
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4868 | 2026-01-14T21:22:55.842Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4869 | 2026-01-14T21:22:55.842Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4870 | 2026-01-14T21:22:55.843Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4871 | 2026-01-14T21:22:55.848Z | TRAC | test_vpc_firewall (SagaExecutor): loading roles
actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }
authenticated = true
resource_id = 001de000-1334-4000-8000-000000000000
resource_type = Fleet
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4872 | 2026-01-14T21:22:55.849Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4873 | 2026-01-14T21:22:55.849Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4874 | 2026-01-14T21:22:55.849Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4875 | 2026-01-14T21:22:55.856Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4876 | 2026-01-14T21:22:55.865Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = CreateChild
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: 6fed4476-e17d-4fb5-9302-d01707840fb5, lookup_type: ByName("second-vpc") }, key: b41a4399-83be-4b0e-8058-6d6a8ee1717b, lookup_type: ById(b41a4399-83be-4b0e-8058-6d6a8ee1717b) }
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4877 | 2026-01-14T21:22:55.866Z | TRAC | test_vpc_firewall (SagaExecutor): authorize begin
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4878 | 2026-01-14T21:22:55.866Z | DEBG | test_vpc_firewall (SagaExecutor): roles
authenticated = true
roles = RoleSet { roles: {} }
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4879 | 2026-01-14T21:22:55.866Z | DEBG | test_vpc_firewall (SagaExecutor): authorize result
action = Query
actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. })
authenticated = true
resource = Database
result = Ok(())
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
saga_name = vpc-create
saga_node = VpcCreateV4Route
silo_id = 001de000-5110-4000-8000-000000000000
silo_user_id = 001de000-05e4-4000-8000-000000004007
type = silo_user
|
| 4880 | 2026-01-14T21:22:55.876Z | DEBG | test_vpc_firewall (SEC): saga log event
new_state = N009 succeeded
sec_id = 913233fe-92a8-4635-9572-183f495429c4
|
| 4881 | 2026-01-14T21:22:55.876Z | DEBG | test_vpc_firewall (SecStore): recording saga event
event_type = Succeeded(Null)
node_id = 9
saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
|