Max level shown:
12026-01-14T21:22:28.533ZDEBGtest_vpc_firewall (init_with_steps): Running step start_crdb
22026-01-14T21:22:28.534ZDEBGtest_vpc_firewall: Starting CRDB
32026-01-14T21:22:28.575ZINFOtest_vpc_firewall: cockroach temporary directory: /var/tmp/omicron_tmp/.tmpXmydPk
42026-01-14T21:22:28.575ZINFOtest_vpc_firewall: cockroach: copying from seed tarball (/var/tmp/omicron_tmp/crdb-base-build/25f7937f9ad789fdb3d5fe26603ea7bfc6d229e3bf5587ce4ec009504e11060b.tar) to storage directory (/var/tmp/omicron_tmp/.tmpXmydPk/data)
52026-01-14T21:22:28.606ZINFOtest_vpc_firewall: cockroach command line: cockroach start-single-node --insecure --http-addr=:0 --store=path=/var/tmp/omicron_tmp/.tmpXmydPk/data,ballast-size=0 --listen-addr [::1]:0 --listening-url-file /var/tmp/omicron_tmp/.tmpXmydPk/listen-url
62026-01-14T21:22:28.607ZINFOtest_vpc_firewall: cockroach environment: BUILDOMAT_JOB_ID=01KEYW6ZBWM4QEBSCMRX4P2GHN BUILDOMAT_TASK_ID=4 CARGO=/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/bin/cargo CARGO_HOME=/home/build/.cargo CARGO_INCREMENTAL=0 CARGO_MANIFEST_DIR=/work/oxidecomputer/omicron/nexus CARGO_PKG_AUTHORS= CARGO_PKG_DESCRIPTION= CARGO_PKG_HOMEPAGE= CARGO_PKG_LICENSE=MPL-2.0 CARGO_PKG_LICENSE_FILE= CARGO_PKG_NAME=omicron-nexus CARGO_PKG_REPOSITORY= CARGO_PKG_RUST_VERSION= CARGO_PKG_VERSION=0.1.0 CARGO_PKG_VERSION_MAJOR=0 CARGO_PKG_VERSION_MINOR=1 CARGO_PKG_VERSION_PATCH=0 CARGO_PKG_VERSION_PRE= CARGO_TERM_COLOR=always CI=true CRDB_SEED_TAR=/var/tmp/omicron_tmp/crdb-base-build/25f7937f9ad789fdb3d5fe26603ea7bfc6d229e3bf5587ce4ec009504e11060b.tar GITHUB_BRANCH=iliana/cockroach-in-switch-zone GITHUB_REF=refs/heads/iliana/cockroach-in-switch-zone GITHUB_REPOSITORY=oxidecomputer/omicron GITHUB_SHA=cdd1d4ed932c03acff05ce286f9dcc941c035089 GOTRACEBACK=crash HOME=/home/build LANG=en_US.UTF-8 LC_ALL=en_US.UTF-8 LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-e269a799996cc73d/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-f08b403ebfa90352/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-8dc5be0faba5452c/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-4ac38c1702e3f2b5/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-b9d704b8d20089f7/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6a545a93d51cd40e/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-0b430c6eb1c88682/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib LOGNAME=build NEXTEST=1 NEXTEST_BIN_EXE_nexus=/work/oxidecomputer/omicron/target/debug/nexus NEXTEST_BIN_EXE_schema-updater=/work/oxidecomputer/omicron/target/debug/schema-updater NEXTEST_EXECUTION_MODE=process-per-test NEXTEST_LD_LIBRARY_PATH=/work/oxidecomputer/omicron/target/debug/build/aws-lc-sys-e269a799996cc73d/out/build/artifacts:/work/oxidecomputer/omicron/target/debug/build/blake3-f08b403ebfa90352/out:/work/oxidecomputer/omicron/target/debug/build/bzip2-sys-8dc5be0faba5452c/out/lib:/work/oxidecomputer/omicron/target/debug/build/libgit2-sys-4ac38c1702e3f2b5/out/build:/work/oxidecomputer/omicron/target/debug/build/ring-b9d704b8d20089f7/out:/work/oxidecomputer/omicron/target/debug/build/tofino-6a545a93d51cd40e/out:/work/oxidecomputer/omicron/target/debug/build/zstd-sys-0b430c6eb1c88682/out:/work/oxidecomputer/omicron/target/debug/deps:/work/oxidecomputer/omicron/target/debug:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib/rustlib/x86_64-unknown-illumos/lib:/home/build/.rustup/toolchains/1.91.1-x86_64-unknown-illumos/lib NEXTEST_PROFILE=ci NEXTEST_RUN_ID=44093501-f026-4d9b-8fd1-a071d6ae713f NEXTEST_TEST_GLOBAL_SLOT=5 NEXTEST_TEST_GROUP=@global NEXTEST_TEST_GROUP_SLOT=none NEXTEST_TEST_PHASE=run OUT_DIR=/work/oxidecomputer/omicron/target/debug/build/omicron-nexus-0f0e157a700d2316/out PATH=/work/oxidecomputer/omicron/out/mgd/root/opt/oxide/mgd/bin:/work/oxidecomputer/omicron/out/dendrite-stub/bin:/work/oxidecomputer/omicron/out/clickhouse:/work/oxidecomputer/omicron/out/cockroachdb/bin:/home/build/.cargo/bin:/usr/bin:/bin:/usr/sbin:/sbin:/opt/ooce/bin:/opt/ooce/sbin PWD=/work/oxidecomputer/omicron RUSTC_BOOTSTRAP=1 RUSTDOCFLAGS=--document-private-items -D warnings RUSTFLAGS=--cfg tokio_unstable -D warnings -C link-arg=-R/usr/platform/oxide/lib/amd64 RUSTUP_HOME=/home/build/.rustup RUSTUP_TOOLCHAIN=1.91.1-x86_64-unknown-illumos RUST_BACKTRACE=1 RUST_RECURSION_COUNT=1 SHLVL=1 SSL_CERT_DIR=/usr/ssl/certs SSL_CERT_FILE=/etc/ssl/cacert.pem TMPDIR=/var/tmp/omicron_tmp TZ=UTC USER=build _=/usr/bin/ptime __NEXTEST_ATTEMPT=1
72026-01-14T21:22:30.339ZINFOtest_vpc_firewall: cockroach pid: 5078
82026-01-14T21:22:30.339ZINFOtest_vpc_firewall: cockroach listen URL: postgresql://root@[::1]:46432/omicron?sslmode=disable
92026-01-14T21:22:30.354ZDEBGtest_vpc_firewall (init_with_steps): Running step start_clickhouse
102026-01-14T21:22:30.354ZDEBGtest_vpc_firewall: Starting Clickhouse
112026-01-14T21:22:30.978ZDEBGtest_vpc_firewall (init_with_steps): Running step start_internal_dns
122026-01-14T21:22:30.978ZINFOtest_vpc_firewall (store): opening sled database path = /var/tmp/omicron_tmp/.tmpJParZw
132026-01-14T21:22:31.111ZINFOtest_vpc_firewall (store): pruning trees for generations newer than 0
142026-01-14T21:22:31.111ZINFOtest_vpc_firewall (store): pruning trees for generations older than 0 keep = 3
152026-01-14T21:22:31.112ZINFOtest_vpc_firewall (dns): DNS server bound to address kind = dns local_address = [::1]:51352
162026-01-14T21:22:31.113ZDEBGtest_vpc_firewall (http): registered endpoint kind = dns local_addr = [::1]:43592 method = GET path = /config versions = from 1.0.0 to 2.0.0
172026-01-14T21:22:31.113ZDEBGtest_vpc_firewall (http): registered endpoint kind = dns local_addr = [::1]:43592 method = GET path = /config versions = all starting from 2.0.0
182026-01-14T21:22:31.113ZDEBGtest_vpc_firewall (http): registered endpoint kind = dns local_addr = [::1]:43592 method = PUT path = /config versions = from 1.0.0 to 2.0.0
192026-01-14T21:22:31.113ZDEBGtest_vpc_firewall (http): registered endpoint kind = dns local_addr = [::1]:43592 method = PUT path = /config versions = all starting from 2.0.0
202026-01-14T21:22:31.113ZINFOtest_vpc_firewall (http): listening kind = dns local_addr = [::1]:43592
212026-01-14T21:22:31.119ZDEBGtest_vpc_firewall (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:43592
222026-01-14T21:22:31.120ZDEBGtest_vpc_firewall (init_with_steps): Running step start_external_dns
232026-01-14T21:22:31.120ZINFOtest_vpc_firewall (store): opening sled database path = /var/tmp/omicron_tmp/.tmpmMxcVK
242026-01-14T21:22:31.132ZINFOtest_vpc_firewall (store): pruning trees for generations newer than 0
252026-01-14T21:22:31.132ZINFOtest_vpc_firewall (store): pruning trees for generations older than 0 keep = 3
262026-01-14T21:22:31.132ZINFOtest_vpc_firewall (dns): DNS server bound to address kind = dns local_address = [::1]:36169
272026-01-14T21:22:31.132ZDEBGtest_vpc_firewall (http): registered endpoint kind = dns local_addr = [::1]:41277 method = GET path = /config versions = from 1.0.0 to 2.0.0
282026-01-14T21:22:31.132ZDEBGtest_vpc_firewall (http): registered endpoint kind = dns local_addr = [::1]:41277 method = GET path = /config versions = all starting from 2.0.0
292026-01-14T21:22:31.132ZDEBGtest_vpc_firewall (http): registered endpoint kind = dns local_addr = [::1]:41277 method = PUT path = /config versions = from 1.0.0 to 2.0.0
302026-01-14T21:22:31.132ZDEBGtest_vpc_firewall (http): registered endpoint kind = dns local_addr = [::1]:41277 method = PUT path = /config versions = all starting from 2.0.0
312026-01-14T21:22:31.132ZINFOtest_vpc_firewall (http): listening kind = dns local_addr = [::1]:41277
322026-01-14T21:22:31.136ZDEBGtest_vpc_firewall (http): successfully registered DTrace USDT probes kind = dns local_addr = [::1]:41277
332026-01-14T21:22:31.137ZDEBGtest_vpc_firewall (init_with_steps): Running step start_nexus_internal
342026-01-14T21:22:31.153ZDEBGtest_vpc_firewall: Starting Nexus (internal API)
352026-01-14T21:22:31.154ZINFOtest_vpc_firewall: setting up nexus server
362026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Action
372026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = AuditLog
382026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = AnyActor
392026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = AuthenticatedActor
402026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = BlueprintConfig
412026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Database
422026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = DnsConfig
432026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Fleet
442026-01-14T21:22:31.156ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Inventory
452026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = IpPoolList
462026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = VpcList
472026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = ConsoleSessionList
482026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = DeviceAuthRequestList
492026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = QuiesceState
502026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloCertificateList
512026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloGroupList
522026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloIdentityProviderList
532026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloUserList
542026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloUserSessionList
552026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloUserTokenList
562026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = UpdateTrustRootList
572026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = TargetReleaseConfig
582026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = AlertClassList
592026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = ScimClientBearerTokenList
602026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = MulticastGroupList
612026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Project
622026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Disk
632026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Snapshot
642026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = ProjectImage
652026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = AffinityGroup
662026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = AntiAffinityGroup
672026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Instance
682026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = IpPool
692026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = InstanceNetworkInterface
702026-01-14T21:22:31.157ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Vpc
712026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = VpcRouter
722026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = InternetGateway
732026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = InternetGatewayIpPool
742026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = InternetGatewayIpAddress
752026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = RouterRoute
762026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = VpcSubnet
772026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = FloatingIp
782026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Image
792026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloImage
802026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = AddressLot
812026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Blueprint
822026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = LoopbackAddress
832026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Certificate
842026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = ConsoleSession
852026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = DeviceAuthRequest
862026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = DeviceAccessToken
872026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = PhysicalDisk
882026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Rack
892026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SshKey
902026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Silo
912026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloUser
922026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SiloGroup
932026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SupportBundle
942026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = IdentityProvider
952026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = SamlIdentityProvider
962026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Sled
972026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = TufRepo
982026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = TufArtifact
992026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = TufTrustRoot
1002026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Alert
1012026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = AlertReceiver
1022026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = WebhookSecret
1032026-01-14T21:22:31.158ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Zpool
1042026-01-14T21:22:31.159ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = Service
1052026-01-14T21:22:31.159ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = UserBuiltin
1062026-01-14T21:22:31.159ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = ScimClientBearerToken
1072026-01-14T21:22:31.159ZINFOtest_vpc_firewall (ServerContext): registering Oso class class = MulticastGroup
1082026-01-14T21:22:31.159ZINFOtest_vpc_firewall (ServerContext): full Oso configuration config = #\n# Oso configuration for Omicron\n# This file is augmented by generated snippets.\n#\n\n#\n# ACTOR TYPES AND BASIC RULES\n#\n\n# `AnyActor` includes both authenticated and unauthenticated users.\nactor AnyActor {}\n\n# An `AuthenticatedActor` has an identity in the system. All of our operations\n# today require that an actor be authenticated.\nactor AuthenticatedActor {}\n\n# For any resource, `actor` can perform action `action` on it if they're\n# authenticated and their role(s) give them the corresponding permission on that\n# resource.\nallow(actor: AnyActor, action: Action, resource) if\n actor.authenticated and\n has_permission(actor.authn_actor.unwrap(), action.to_perm(), resource);\n\n# Define role relationships\nhas_role(actor: AuthenticatedActor, role: String, resource: Resource)\n\tif resource.has_role(actor, role);\n\n#\n# ROLES AND PERMISSIONS IN THE FLEET/SILO/PROJECT HIERARCHY\n#\n# We define the following permissions for most resources in the system:\n#\n# - "create_child": required to create child resources (of any type)\n#\n# - "list_children": required to list child resources (of all types) of a\n# resource\n#\n# - "modify": required to modify or delete a resource\n#\n# - "read": required to read a resource\n#\n# We define the following predefined roles for only a few high-level resources:\n# the Fleet (see below), Silo, Organization, and Project. The specific roles\n# are oriented around intended use-cases:\n#\n# - "admin": has all permissions on the resource\n#\n# - "collaborator": has "read", "list_children", and "create_child", plus\n# the "admin" role for child resources. The idea is that if you're an\n# Organization Collaborator, you have full control over the Projects within\n# the Organization, but you cannot modify or delete the Organization itself.\n#\n# - "viewer": has "read" and "list_children" on a resource\n#\n# Below the Project level, permissions are granted via roles at the Project\n# level. For example, for someone to be able to create, modify, or delete any\n# Instances, they must be granted project.collaborator, which means they can\n# create, modify, or delete _all_ resources in the Project.\n#\n# The complete set of predefined roles:\n#\n# - fleet.admin (superuser for the whole system)\n# - fleet.collaborator (can manage Silos)\n# - fleet.viewer (can read most non-siloed resources in the system)\n# - silo.admin (superuser for the silo)\n# - silo.collaborator (can create and own Organizations; grants project.admin on all projects)\n# - silo.limited-collaborator (grants project.limited-collaborator on all projects)\n# - silo.viewer (can read most resources within the Silo; grants project.viewer)\n# - organization.admin (complete control over an organization)\n# - organization.collaborator (can manage Projects)\n# - organization.viewer (can read most resources within the Organization)\n# - project.admin (complete control over a Project)\n# - project.collaborator (can manage all resources within the Project, including networking)\n# - project.limited-collaborator (can manage compute resources, but not networking resources)\n# - project.viewer (can read most resources within the Project)\n#\n# Outside the Silo/Organization/Project hierarchy, we (currently) treat most\n# resources as nested under Fleet or else a synthetic resource (see below). We\n# do not yet support role assignments on anything other than Fleet, Silo,\n# Organization, or Project.\n#\n\n# "Fleet" is a global singleton representing the whole system. The name comes\n# from the idea described in RFD 24, but it's not quite right. This probably\n# should be more like "Region" or "AvailabilityZone". The precise boundaries\n# have not yet been figured out.\nresource Fleet {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\troles = [\n\t # Roles that can be attached by users\n\t "admin",\n\t "collaborator",\n\t "viewer",\n\n\t # Internal-only roles\n\t "external-authenticator"\n\t];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n}\n\n# For fleets specifically, roles can be conferred by roles on the user's Silo.\n# Note that certain Actors may not ever have any roles assigned to them, like\n# SCIM Actors.\nhas_role(actor: AuthenticatedActor, role: String, _: Fleet) if\n\tsilo_role in actor.confers_fleet_role(role) and\n\thas_role(actor, silo_role, actor.silo.unwrap());\n\nresource Silo {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\n\t"create_child" if "collaborator";\n\t"modify" if "admin";\n\n\t# Permissions implied by roles on this resource's parent (Fleet). Fleet\n\t# privileges allow a user to see and potentially administer the Silo,\n\t# but they do not give anyone permission to look at anything inside the\n\t# Silo. To achieve this, we use permission rules here. (If we granted\n\t# Fleet administrators _roles_ on the Silo, then those would cascade\n\t# into the Silo as well.)\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "collaborator" on "parent_fleet";\n\n\t# external authenticator has to create silo users\n\t"list_children" if "external-authenticator" on "parent_fleet";\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", silo: Silo)\n\tif silo.fleet = fleet;\n\n# As a special case, all authenticated users can read their own Silo. That's\n# not quite the same as having the "viewer" role. For example, they cannot list\n# Organizations in the Silo.\n#\n# One reason this is necessary is because if an unprivileged user tries to\n# create an Organization using "POST /organizations", they should get back a 403\n# (which implies they're able to see /organizations, which is essentially seeing\n# the Silo itself) rather than a 404. This behavior isn't a hard constraint\n# (i.e., you could reasonably get a 404 for an API you're not allowed to call).\n# Nor is the implementation (i.e., we could special-case this endpoint somehow).\n# But granting this permission is the simplest way to keep this endpoint's\n# behavior consistent with the rest of the API.\n#\n# This rule is also used to determine if a user can list the identity providers\n# in the Silo (which they should be able to), since that's predicated on being\n# able to read the Silo.\n#\n# It's unclear what else would break if users couldn't see their own Silo.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif actor.is_user and silo in actor.silo;\n\nresource Project {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\troles = [ "admin", "collaborator", "limited-collaborator", "viewer" ];\n\n\t# Roles implied by other roles on this resource\n\t# Role hierarchy: admin > collaborator > limited-collaborator > viewer\n\t#\n\t# The "limited-collaborator" role can create/modify non-networking\n\t# resources (instances, disks, etc.) but cannot create/modify networking\n\t# infrastructure (VPCs, subnets, routers, internet gateways).\n\t# See nexus/authz-macros for InProjectLimited vs InProjectFull.\n\t"viewer" if "limited-collaborator";\n\t"limited-collaborator" if "collaborator";\n\t"collaborator" if "admin";\n\n\t# Permissions granted directly by roles on this resource\n\t"list_children" if "viewer";\n\t"read" if "viewer";\n\t"create_child" if "limited-collaborator";\n\t"modify" if "admin";\n\n\t# Roles implied by roles on this resource's parent (Silo)\n\trelations = { parent_silo: Silo };\n\t"admin" if "collaborator" on "parent_silo";\n\t"limited-collaborator" if "limited-collaborator" on "parent_silo";\n\t"viewer" if "viewer" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", project: Project)\n\tif project.silo = silo;\n\n#\n# GENERAL RESOURCES OUTSIDE THE SILO/PROJECT HIERARCHY\n#\n# Many resources use snippets of Polar generated by the `authz_resource!` Rust\n# macro. Some resources require custom Polar code. Those appear here.\n#\n\nresource Certificate {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Fleet-level and silo-level roles both grant privileges on certificates.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", certificate: Certificate)\n\tif certificate.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", certificate: Certificate)\n\tif certificate.silo.fleet = fleet;\n\nresource SiloUser {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\t# Fleet and Silo administrators can manage a Silo's users. This is one\n\t# of the only areas of Silo configuration that Fleet Administrators have\n\t# permissions on.\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "read" on "parent_fleet";\n\t"read" if "read" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", user: SiloUser)\n\tif user.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", user: SiloUser)\n\tif user.silo.fleet = fleet;\n\n# authenticated actors have all permissions on themselves\nhas_permission(actor: AuthenticatedActor, _perm: String, silo_user: SiloUser)\n if actor.equals_silo_user(silo_user);\n\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_user and silo_user.silo in actor.silo;\n\nresource SiloGroup {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "read",\n\t "create_child",\n\t];\n\n\trelations = { parent_silo: Silo };\n\t"list_children" if "read" on "parent_silo";\n\t"read" if "read" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", group: SiloGroup)\n\tif group.silo = silo;\n\nresource SshKey {\n\tpermissions = [ "read", "modify" ];\n\trelations = { silo_user: SiloUser };\n\n\t"read" if "read" on "silo_user";\n}\n# We want to allow the user to modify the ssh key but disallow a SCIM IdP token\n# from doing the same.\nhas_permission(actor: AuthenticatedActor, "modify", ssh_key: SshKey)\n\tif actor.is_user and has_permission(actor, "modify", ssh_key.silo_user);\nhas_relation(user: SiloUser, "silo_user", ssh_key: SshKey)\n\tif ssh_key.silo_user = user;\n\nresource IdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", identity_provider: IdentityProvider)\n\tif identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: IdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource SamlIdentityProvider {\n\tpermissions = [\n\t "read",\n\t "modify",\n\t "create_child",\n\t "list_children",\n\t];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges on identity providers.\n\t"read" if "viewer" on "parent_silo";\n\t"list_children" if "viewer" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges on identity providers.\n\t"read" if "viewer" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", saml_identity_provider: SamlIdentityProvider)\n\tif saml_identity_provider.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SamlIdentityProvider)\n\tif collection.silo.fleet = fleet;\n\nresource ScimClientBearerToken {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n # necessary to authenticate SCIM actors\n\t"read" if "external-authenticator" on "parent_fleet";\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_silo";\n\t"modify" if "admin" on "parent_silo";\n\n\t# Fleet-level roles also grant privileges for SCIM client tokens.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token: ScimClientBearerToken)\n\tif scim_client_bearer_token.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerToken)\n\tif collection.silo.fleet = fleet;\n\n\n#\n# SYNTHETIC RESOURCES OUTSIDE THE SILO HIERARCHY\n#\n# The resources here do not correspond to anything that appears explicitly in\n# the API or is stored in the database. These are used either at the top level\n# of the API path (e.g., "/v1/system/ip-pools") or as an implementation detail of the system\n# (in the case of console sessions and "Database"). The policies are\n# either statically-defined in this file or driven by role assignments on the\n# Fleet. None of these resources defines their own roles.\n#\n\n# Describes the quiesce state of a particular Nexus instance.\n#\n# These authz checks must not require the database. We grant this directly to\n# callers of the internal API.\nresource QuiesceState {\n\tpermissions = [ "read", "modify" ];\n}\nhas_permission(USER_INTERNAL_API: AuthenticatedActor, "read", _q: QuiesceState);\nhas_permission(\n USER_INTERNAL_API: AuthenticatedActor,\n "modify",\n _q: QuiesceState\n);\n\n# Describes the policy for reading and modifying DNS configuration\n# (both internal and external)\nresource DnsConfig {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t# "external-authenticator" requires these permissions because that's the\n\t# context that Nexus uses when creating and deleting Silos. These\n\t# operations necessarily need to read and modify DNS configuration.\n\t"read" if "external-authenticator" on "parent_fleet";\n\t"modify" if "external-authenticator" on "parent_fleet";\n\t# "admin" on the parent fleet also gets these permissions, primarily for\n\t# the test suite.\n\t"read" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", dns_config: DnsConfig)\n\tif dns_config.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource BlueprintConfig {\n\tpermissions = [\n\t "list_children", # list blueprints\n\t "create_child", # create blueprint\n\t "read", # read the current target\n\t "modify", # change the current target\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "admin" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n\t"list_children" if "viewer" on "parent_fleet";\n\t"read" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", list: BlueprintConfig)\n\tif list.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/update/trust-roots" in the API\nresource UpdateTrustRootList {\n\tpermissions = [ "list_children", "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"list_children" if "viewer" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: UpdateTrustRootList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for accessing blueprints\nresource TargetReleaseConfig {\n\tpermissions = [\n\t "read", # read the current target release\n\t "modify", # change the current target release\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", resource: TargetReleaseConfig)\n\tif resource.fleet = fleet;\n\n# Describes the policy for reading and modifying low-level inventory\nresource Inventory {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_fleet: Fleet };\n\t"read" if "viewer" on "parent_fleet";\n\t"modify" if "admin" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", inventory: Inventory)\n\tif inventory.fleet = fleet;\n\n# Describes the policy for accessing "/v1/system/ip-pools" in the API\nresource IpPoolList {\n\tpermissions = [\n\t "list_children",\n\t "modify",\n\t "create_child",\n\t];\n\n\t# Fleet Administrators can create or modify the IP Pools list.\n\trelations = { parent_fleet: Fleet };\n\t"modify" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list IP Pools\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", ip_pool_list: IpPoolList)\n\tif ip_pool_list.fleet = fleet;\n\n# Any authenticated user can create a child of a provided IP Pool.\n# This is necessary to use the pools when provisioning instances.\nhas_permission(actor: AuthenticatedActor, "create_child", ip_pool: IpPool)\n\tif actor.is_user and silo in actor.silo and silo.fleet = ip_pool.fleet;\n\n# Describes the policy for accessing "/v1/multicast-groups" in the API\nresource MulticastGroupList {\n\tpermissions = [\n\t "list_children",\n\t "create_child",\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\t# Fleet Administrators can create multicast groups\n\t"create_child" if "admin" on "parent_fleet";\n\n\t# Fleet Viewers can list multicast groups\n\t"list_children" if "viewer" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", multicast_group_list: MulticastGroupList)\n\tif multicast_group_list.fleet = fleet;\n\n# Any authenticated user can create multicast groups in their fleet.\n# This is necessary to allow silo users to create multicast groups for\n# cross-project and cross-silo communication without requiring Fleet::Admin.\nhas_permission(actor: AuthenticatedActor, "create_child", multicast_group_list: MulticastGroupList)\n\tif silo in actor.silo and silo.fleet = multicast_group_list.fleet;\n\n# Any authenticated user can list multicast groups in their fleet.\n# This is necessary because multicast groups are fleet-scoped resources that\n# silo users need to discover and attach their instances to, without requiring\n# Fleet::Viewer role.\nhas_permission(actor: AuthenticatedActor, "list_children", multicast_group_list: MulticastGroupList)\n\tif silo in actor.silo and silo.fleet = multicast_group_list.fleet;\n\n# Any authenticated user can read and modify individual multicast groups in their fleet.\n# Users can create, modify, and consume (attach instances to) multicast groups.\n# This enables cross-project and cross-silo multicast while maintaining\n# appropriate security boundaries via API authorization and underlay group\n# membership validation.\nhas_permission(actor: AuthenticatedActor, "read", multicast_group: MulticastGroup)\n\tif silo in actor.silo and silo.fleet = multicast_group.fleet;\n\nhas_permission(actor: AuthenticatedActor, "modify", multicast_group: MulticastGroup)\n\tif silo in actor.silo and silo.fleet = multicast_group.fleet;\n\n# Describes the policy for reading and writing the audit log\nresource AuditLog {\n\tpermissions = [\n\t "list_children", # retrieve audit log\n\t "create_child", # create audit log entry\n\t];\n\n\trelations = { parent_fleet: Fleet };\n\n\t# Fleet viewers can read the audit log\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\n# Any actor should be able to write to the audit log because we need to be able\n# to write to the log from any request, authenticated or not. Audit log writes\n# are always a byproduct of other operations: there are no endpoints that allow\n# the user to write to the log deliberately. Note we use AuthenticatedActor\n# because we don't really mean unauthenticated -- in the case of login\n# operations, we use the external authenticator actor that creates the session\n# to authorize the audit log write.\nhas_permission(_actor: AuthenticatedActor, "create_child", _audit_log: AuditLog);\n\nhas_relation(fleet: Fleet, "parent_fleet", audit_log: AuditLog)\n\tif audit_log.fleet = fleet;\n\n# Describes the policy for creating and managing web console sessions.\nresource ConsoleSessionList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: ConsoleSessionList)\n\tif collection.fleet = fleet;\n\n# Allow silo admins to delete and list user sessions\nresource SiloUserSessionList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's sessions.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's sessions.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserSessionList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own sessions\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserSessionList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Allow silo admins to delete and list user access tokens\nresource SiloUserTokenList {\n permissions = [ "modify", "list_children" ];\n relations = { parent_silo: Silo };\n\n # A silo admin can modify (e.g., delete) a user's tokens.\n "modify" if "admin" on "parent_silo";\n\n # A silo admin can list a user's tokens.\n "list_children" if "admin" on "parent_silo";\n}\nhas_relation(silo: Silo, "parent_silo", authn_list: SiloUserTokenList)\n if authn_list.silo_user.silo = silo;\n\n# give users 'modify' and 'list_children' on their own tokens\nhas_permission(actor: AuthenticatedActor, "modify", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\nhas_permission(actor: AuthenticatedActor, "list_children", authn_list: SiloUserTokenList)\n if actor.equals_silo_user(authn_list.silo_user);\n\n# Describes the policy for creating and managing device authorization requests.\nresource DeviceAuthRequestList {\n\tpermissions = [ "create_child" ];\n\trelations = { parent_fleet: Fleet };\n\t"create_child" if "external-authenticator" on "parent_fleet";\n}\nhas_relation(fleet: Fleet, "parent_fleet", collection: DeviceAuthRequestList)\n\tif collection.fleet = fleet;\n\n# Describes the policy for creating and managing Silo certificates\nresource SiloCertificateList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Both Fleet and Silo administrators can see and modify the Silo's\n\t# certificates.\n\t"list_children" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloCertificateList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloCertificateList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo identity providers\nresource SiloIdentityProviderList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the identity providers in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's identity provider\n\t# configuration. This is one of the only areas of Silo configuration\n\t# that Fleet Administrators have permissions on. This is also one of\n\t# the only cases where we need to look two levels up the hierarchy to\n\t# see if somebody has the right permission. For most other things,\n\t# permissions cascade down the hierarchy so we only need to look at the\n\t# parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloIdentityProviderList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloIdentityProviderList)\n\tif collection.silo.fleet = fleet;\n\n# Describes the policy for creating and managing Silo users (mostly intended for\n# API-managed users)\nresource SiloUserList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the users in the\n\t# Silo) can see the users in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's users. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloUserList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloUserList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on users.\nhas_permission(actor: AuthenticatedActor, "read", silo_user: SiloUser)\n if actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_user_list: SiloUserList)\n\tif actor.is_scim_idp and silo_user_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_user: SiloUser)\n\tif actor.is_scim_idp and silo_user.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_user_list: SiloUserList)\n if actor.is_scim_idp and silo_user_list.silo in actor.silo;\n\n# Describes the policy for creating and managing Silo groups (mostly intended\n# for API-managed groups)\nresource SiloGroupList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Everyone who can read the Silo (which includes all the groups in the\n\t# Silo) can see the groups in it.\n\t"list_children" if "read" on "parent_silo";\n\n\t# Fleet and Silo administrators can manage the Silo's groups. This is\n\t# one of the only areas of Silo configuration that Fleet Administrators\n\t# have permissions on. This is also one of the few cases (so far) where\n\t# we need to look two levels up the hierarchy to see if somebody has the\n\t# right permission. For most other things, permissions cascade down the\n\t# hierarchy so we only need to look at the parent.\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_fleet";\n\t"create_child" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", collection: SiloGroupList)\n\tif collection.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: SiloGroupList)\n\tif collection.silo.fleet = fleet;\n\n# Grant SCIM IdP actors the permissions they need on groups.\nhas_permission(actor: AuthenticatedActor, "read", silo_group: SiloGroup)\n if actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "create_child", silo_group_list: SiloGroupList)\n\tif actor.is_scim_idp and silo_group_list.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "modify", silo_group: SiloGroup)\n\tif actor.is_scim_idp and silo_group.silo in actor.silo;\nhas_permission(actor: AuthenticatedActor, "list_children", silo_group_list: SiloGroupList)\n if actor.is_scim_idp and silo_group_list.silo in actor.silo;\n\n# These rules grants the external authenticator role the permissions it needs to\n# read silo users and modify their sessions. This is necessary for login to\n# work.\nhas_permission(actor: AuthenticatedActor, "read", silo: Silo)\n\tif has_role(actor, "external-authenticator", silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", user: SiloUser)\n\tif has_role(actor, "external-authenticator", user.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "read", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", group: SiloGroup)\n\tif has_role(actor, "external-authenticator", group.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\nhas_permission(actor: AuthenticatedActor, "modify", session: ConsoleSession)\n\tif has_role(actor, "external-authenticator", session.fleet);\n\n# All authenticated users can read and delete device authn requests because\n# by necessity these operations happen before we've figured out what user (or\n# even Silo) the device auth is associated with. Any user can claim a device\n# auth request with the right user code (that's how it works) -- it's the user\n# code and associated logic that prevents unauthorized access here.\nhas_permission(actor: AuthenticatedActor, "read", _device_auth: DeviceAuthRequest)\n if actor.is_user;\nhas_permission(actor: AuthenticatedActor, "modify", _device_auth: DeviceAuthRequest)\n if actor.is_user;\n\nhas_permission(actor: AuthenticatedActor, "read", device_token: DeviceAccessToken)\n\tif has_role(actor, "external-authenticator", device_token.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", identity_provider: IdentityProvider)\n\tif has_role(actor, "external-authenticator", identity_provider.silo.fleet);\n\nhas_permission(actor: AuthenticatedActor, "read", saml_identity_provider: SamlIdentityProvider)\n\tif has_role(actor, "external-authenticator", saml_identity_provider.silo.fleet);\n\n# Describes the policy for who can access the internal database.\nresource Database {\n\tpermissions = [\n\t # "query" is required to perform any query against the database,\n\t # whether a read or write query. This is checked when an operation\n\t # checks out a database connection from the connection pool.\n\t #\n\t # Any authenticated user gets this permission. There's generally\n\t # some other authz check involved in the database query. For\n\t # example, if you're querying the database to "read" a "Project", we\n\t # should also be checking that. So why do we do this at all? It's\n\t # a belt-and-suspenders measure so that if we somehow introduced an\n\t # unauthenticated code path that hits the database, it cannot be\n\t # used to DoS the database because we won't allow the operation to\n\t # make the query. (As long as the code path _is_ authenticated, we\n\t # can use throttling mechanisms to prevent DoS.)\n\t "query",\n\n\t # "modify" is required to populate database data that's delivered\n\t # with the system. It should also be required for schema changes,\n\t # when we support those. This is separate from "query" so that we\n\t # cannot accidentally invoke these code paths from API calls and\n\t # other general functions.\n\t "modify"\n\t];\n}\n\n# All authenticated users have the "query" permission on the database.\nhas_permission(_actor: AuthenticatedActor, "query", _resource: Database);\n\n# The "db-init" user is the only one with the "modify" permission.\nhas_permission(USER_DB_INIT: AuthenticatedActor, "modify", _resource: Database);\nhas_permission(USER_DB_INIT: AuthenticatedActor, "create_child", _resource: IpPoolList);\n# It also has "admin" on the internal silo to populate it with built-in resources.\n# TODO-completeness: actually limit to just internal silo and not all silos\nhas_role(USER_DB_INIT: AuthenticatedActor, "admin", _silo: Silo);\n\n# Allow the internal API admin permissions on all silos.\nhas_role(USER_INTERNAL_API: AuthenticatedActor, "admin", _silo: Silo);\n\nresource WebhookSecret {\n\tpermissions = [ "read", "modify" ];\n\trelations = { parent_alert_receiver: AlertReceiver };\n\n\t"read" if "read" on "parent_alert_receiver";\n\t"modify" if "modify" on "parent_alert_receiver";\n}\n\nhas_relation(rx: AlertReceiver, "parent_alert_receiver", secret: WebhookSecret)\n\tif secret.alert_receiver = rx;\n\nresource AlertClassList {\n\tpermissions = [ "list_children" ];\n\trelations = { parent_fleet: Fleet };\n\n\t"list_children" if "viewer" on "parent_fleet";\n}\n\nhas_relation(fleet: Fleet, "parent_fleet", collection: AlertClassList)\n\tif collection.fleet = fleet;\n\nresource ScimClientBearerTokenList {\n\tpermissions = [ "create_child", "list_children" ];\n\trelations = { parent_silo: Silo, parent_fleet: Fleet };\n\n\t# Silo-level roles grant privileges for SCIM client tokens.\n # These are all admin because being able to create these tokens would allow\n # a user to grant themselves admin by modifying group membership through SCIM calls\n\t"create_child" if "admin" on "parent_silo";\n\t"list_children" if "admin" on "parent_silo";\n\n # Fleet-level roles also grant privileges for SCIM client tokens, for\n # configuration before silo admins are present.\n\t"create_child" if "admin" on "parent_fleet";\n\t"list_children" if "admin" on "parent_fleet";\n}\nhas_relation(silo: Silo, "parent_silo", scim_client_bearer_token_list: ScimClientBearerTokenList)\n\tif scim_client_bearer_token_list.silo = silo;\nhas_relation(fleet: Fleet, "parent_fleet", collection: ScimClientBearerTokenList)\n\tif collection.silo.fleet = fleet;\n\n# VpcList is a synthetic resource for controlling VPC creation.\n# Unlike other project resources, VPC creation requires the full "collaborator"\n# role rather than "limited-collaborator", enforcing the networking restriction.\n# This allows organizations to restrict who can reconfigure the network topology\n# while still allowing users with limited-collaborator to work with compute\n# resources (instances, disks, etc.) within the existing network.\nresource VpcList {\n\tpermissions = [ "list_children", "create_child" ];\n\n\trelations = { containing_project: Project };\n\n\t"list_children" if "read" on "containing_project";\n\t"create_child" if "collaborator" on "containing_project";\n}\nhas_relation(project: Project, "containing_project", collection: VpcList)\n\tif collection.project = project;\n\n\n\n resource Disk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Disk)\n if child.project = parent;\n \n\n resource Snapshot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Snapshot)\n if child.project = parent;\n \n\n resource ProjectImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: ProjectImage)\n if child.project = parent;\n \n\n resource AffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AffinityGroup)\n if child.project = parent;\n \n\n resource AntiAffinityGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: AntiAffinityGroup)\n if child.project = parent;\n \n\n resource Instance {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Instance)\n if child.project = parent;\n \n\n resource IpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: IpPool)\n if child.fleet = fleet;\n \n\n resource InstanceNetworkInterface {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Instance\n };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InstanceNetworkInterface)\n if has_relation(project, "containing_project", child.instance);\n\n has_relation(parent: Instance, "parent", child: InstanceNetworkInterface)\n if child.instance = parent;\n \n\n resource Vpc {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: Vpc)\n if child.project = parent;\n \n\n resource VpcRouter {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcRouter)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcRouter)\n if child.vpc = parent;\n \n\n resource InternetGateway {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGateway)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: InternetGateway)\n if child.vpc = parent;\n \n\n resource InternetGatewayIpPool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpPool)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpPool)\n if child.internet_gateway = parent;\n \n\n resource InternetGatewayIpAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: InternetGateway\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: InternetGatewayIpAddress)\n if has_relation(project, "containing_project", child.internet_gateway);\n\n has_relation(parent: InternetGateway, "parent", child: InternetGatewayIpAddress)\n if child.internet_gateway = parent;\n \n\n resource RouterRoute {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: VpcRouter\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: RouterRoute)\n if has_relation(project, "containing_project", child.vpc_router);\n\n has_relation(parent: VpcRouter, "parent", child: RouterRoute)\n if child.vpc_router = parent;\n \n\n resource VpcSubnet {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = {\n containing_project: Project,\n parent: Vpc\n };\n\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "collaborator" on "containing_project";\n "create_child" if "collaborator" on "containing_project";\n }\n\n has_relation(project: Project, "containing_project", child: VpcSubnet)\n if has_relation(project, "containing_project", child.vpc);\n\n has_relation(parent: Vpc, "parent", child: VpcSubnet)\n if child.vpc = parent;\n \n\n resource FloatingIp {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_project: Project };\n "list_children" if "viewer" on "containing_project";\n "read" if "viewer" on "containing_project";\n "modify" if "limited-collaborator" on "containing_project";\n "create_child" if "limited-collaborator" on "containing_project";\n }\n\n has_relation(parent: Project, "containing_project", child: FloatingIp)\n if child.project = parent;\n \n\n resource Image {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: Image)\n if child.silo = parent;\n \n\n resource SiloImage {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n\n relations = { containing_silo: Silo };\n "list_children" if "viewer" on "containing_silo";\n "read" if "viewer" on "containing_silo";\n "modify" if "collaborator" on "containing_silo";\n "create_child" if "collaborator" on "containing_silo";\n }\n\n has_relation(parent: Silo, "containing_silo", child: SiloImage)\n if child.silo = parent;\n \n\n resource AddressLot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AddressLot)\n if child.fleet = fleet;\n \n\n resource Blueprint {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Blueprint)\n if child.fleet = fleet;\n \n\n resource LoopbackAddress {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: LoopbackAddress)\n if child.fleet = fleet;\n \n\n\n resource ConsoleSession {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: ConsoleSession)\n if child.fleet = fleet;\n \n\n resource DeviceAuthRequest {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAuthRequest)\n if child.fleet = fleet;\n \n\n resource DeviceAccessToken {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: DeviceAccessToken)\n if child.fleet = fleet;\n \n\n resource PhysicalDisk {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: PhysicalDisk)\n if child.fleet = fleet;\n \n\n resource Rack {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Rack)\n if child.fleet = fleet;\n \n\n\n\n\n\n resource SupportBundle {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: SupportBundle)\n if child.fleet = fleet;\n \n\n\n\n resource Sled {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Sled)\n if child.fleet = fleet;\n \n\n resource TufRepo {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufRepo)\n if child.fleet = fleet;\n \n\n resource TufArtifact {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufArtifact)\n if child.fleet = fleet;\n \n\n resource TufTrustRoot {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: TufTrustRoot)\n if child.fleet = fleet;\n \n\n resource Alert {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Alert)\n if child.fleet = fleet;\n \n\n resource AlertReceiver {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: AlertReceiver)\n if child.fleet = fleet;\n \n\n\n resource Zpool {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Zpool)\n if child.fleet = fleet;\n \n\n resource Service {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: Service)\n if child.fleet = fleet;\n \n\n resource UserBuiltin {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: UserBuiltin)\n if child.fleet = fleet;\n \n\n\n resource MulticastGroup {\n permissions = [\n "list_children",\n "modify",\n "read",\n "create_child",\n ];\n \n relations = { parent_fleet: Fleet };\n "list_children" if "viewer" on "parent_fleet";\n "read" if "viewer" on "parent_fleet";\n "modify" if "admin" on "parent_fleet";\n "create_child" if "admin" on "parent_fleet";\n }\n has_relation(fleet: Fleet, "parent_fleet", child: MulticastGroup)\n if child.fleet = fleet;\n
1092026-01-14T21:22:31.200ZINFOtest_vpc_firewall (ServerContext): Setting up resolver using DNS address: [::1]:51352
1102026-01-14T21:22:31.200ZINFOtest_vpc_firewall (DnsResolver): new DNS resolver addresses = [[::1]:51352]
1112026-01-14T21:22:31.202ZINFOtest_vpc_firewall (ServerContext): Setting up qorb database pool from a single host url = PostgresConfigWithUrl {\n url_raw: "postgresql://root@[::1]:46432/omicron?sslmode=disable",\n config: Config {\n user: Some(\n "root",\n ),\n password: None,\n dbname: Some(\n "omicron",\n ),\n options: None,\n application_name: None,\n ssl_mode: Disable,\n host: [\n Tcp(\n "::1",\n ),\n ],\n hostaddr: [],\n port: [\n 46432,\n ],\n connect_timeout: None,\n tcp_user_timeout: None,\n keepalives: true,\n keepalives_idle: 7200s,\n keepalives_interval: None,\n keepalives_retries: None,\n target_session_attrs: Any,\n channel_binding: Prefer,\n load_balance_hosts: Disable,\n },\n}
1122026-01-14T21:22:31.206ZDEBGtest_vpc_firewall (ServerContext): registered USDT probes
1132026-01-14T21:22:33.220ZINFOtest_vpc_firewall (datastore): Database schema version is up to date desired_version = 215.0.0 found_version = 215.0.0
1142026-01-14T21:22:33.239ZWARNtest_vpc_firewall (datastore): No db_metadata_nexus records exist - skipping access check explanation = This is expected during initial deployment or before migration nexus_id = 913233fe-92a8-4635-9572-183f495429c4 (omicron_zone)
1152026-01-14T21:22:33.239ZINFOtest_vpc_firewall (nexus): Datastore is ready for usage
1162026-01-14T21:22:33.364ZDEBGtest_vpc_firewall (clickhouse-client): registered USDT probes id = ba4222a0-3d7c-4181-9157-e0113d70bad4
1172026-01-14T21:22:33.458ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stop-request versions = all
1182026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /crucible/0/upstairs/{upstairs_id}/downstairs/{downstairs_id}/stopped versions = all
1192026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair/{repair_id}/progress versions = all
1202026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-finish versions = all
1212026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /crucible/0/upstairs/{upstairs_id}/repair-start versions = all
1222026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /disk/{disk_id}/remove-read-only-parent versions = all
1232026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = PUT path = /disks/{disk_id} versions = all
1242026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /metrics/collectors versions = all
1252026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = GET path = /metrics/collectors/{collector_id}/producers versions = all
1262026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /metrics/producers versions = all
1272026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = GET path = /nat/ipv4/changeset/{from_gen} versions = all
1282026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = GET path = /probes/{sled} versions = all
1292026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /refresh-vpc-routes versions = all
1302026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = GET path = /sled-agents/{sled_id} versions = all
1312026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /sled-agents/{sled_id} versions = all
1322026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = PUT path = /switch/{switch_id} versions = all
1332026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = GET path = /v1/ping versions = all
1342026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = PUT path = /vmms/{propolis_id} versions = all
1352026-01-14T21:22:33.459ZDEBGtest_vpc_firewall (dropshot_internal): registered endpoint local_addr = 127.0.0.1:45286 method = POST path = /volume/{volume_id}/remove-read-only-parent versions = all
1362026-01-14T21:22:33.460ZINFOtest_vpc_firewall (dropshot_internal): listening local_addr = 127.0.0.1:45286
1372026-01-14T21:22:33.461ZDEBGtest_vpc_firewall (dropshot_internal): successfully registered DTrace USDT probes local_addr = 127.0.0.1:45286
1382026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /bgtasks versions = all
1392026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /bgtasks/activate versions = all
1402026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /bgtasks/view/{bgtask_name} versions = all
1412026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /clickhouse/policy versions = all
1422026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /clickhouse/policy versions = all
1432026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /debug/fetch-omdb-binary versions = all
1442026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /demo-saga versions = all
1452026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /demo-saga/{demo_saga_id}/complete versions = all
1462026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /deployment/blueprints/all versions = all
1472026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = DELETE path = /deployment/blueprints/all/{blueprint_id} versions = all
1482026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /deployment/blueprints/all/{blueprint_id} versions = all
1492026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /deployment/blueprints/import versions = all
1502026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /deployment/blueprints/regenerate versions = all
1512026-01-14T21:22:33.470ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /deployment/blueprints/target versions = all
1522026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /deployment/blueprints/target versions = all
1532026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = PUT path = /deployment/blueprints/target/enabled versions = all
1542026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /deployment/reconfigurator-config versions = all
1552026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /deployment/reconfigurator-config versions = all
1562026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /deployment/reconfigurator-config/{version} versions = all
1572026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /deployment/update-status versions = all
1582026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /experimental/v1/system/support-bundles versions = all
1592026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /experimental/v1/system/support-bundles versions = all
1602026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = DELETE path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1612026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1622026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = PUT path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
1632026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
1642026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
1652026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
1662026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
1672026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/index versions = all
1682026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /instances/{instance_id}/migrate versions = all
1692026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /mgs-updates versions = all
1702026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /oximeter/read-policy versions = all
1712026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /oximeter/read-policy versions = all
1722026-01-14T21:22:33.471ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /physical-disk/expunge versions = all
1732026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /quiesce versions = all
1742026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /quiesce versions = all
1752026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = PUT path = /racks/{rack_id}/initialization-complete versions = all
1762026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /sagas versions = all
1772026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /sagas/{saga_id} versions = all
1782026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /sleds/add versions = all
1792026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = POST path = /sleds/expunge versions = all
1802026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /sleds/uninitialized versions = all
1812026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): registered endpoint local_addr = 127.0.0.1:36202 method = GET path = /v1/ping versions = all
1822026-01-14T21:22:33.472ZINFOtest_vpc_firewall (dropshot_lockstep): listening local_addr = 127.0.0.1:36202
1832026-01-14T21:22:33.472ZDEBGtest_vpc_firewall (dropshot_lockstep): successfully registered DTrace USDT probes local_addr = 127.0.0.1:36202
1842026-01-14T21:22:33.473ZINFOtest_vpc_firewall (SEC): SEC running sec_id = 913233fe-92a8-4635-9572-183f495429c4
1852026-01-14T21:22:33.475ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
1862026-01-14T21:22:33.475ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
1872026-01-14T21:22:33.479ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1882026-01-14T21:22:33.479ZDEBGtest_vpc_firewall (DataLoader): attempting to create built-in users
1892026-01-14T21:22:33.481ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
1902026-01-14T21:22:33.481ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
1912026-01-14T21:22:33.482ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
1922026-01-14T21:22:33.921ZINFOtest_vpc_firewall (MgsUpdateDriver): starting MgsUpdateDriver
1932026-01-14T21:22:33.935ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: c4 38 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .8..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:56004 req_id = ec636ebb-e618-4471-89e1-33388b11a51d
1942026-01-14T21:22:33.937ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 50232,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:56004 req_id = ec636ebb-e618-4471-89e1-33388b11a51d
1952026-01-14T21:22:33.938ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 50232, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:56004 req_id = ec636ebb-e618-4471-89e1-33388b11a51d
1962026-01-14T21:22:33.940ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 74 (0x4a) bytes\n0000: 81 a9 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 ............._re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........ kind = dns peer_addr = [::1]:64613 req_id = a8e985ef-ef7c-41c4-a4f3-8af84881e6c7
1972026-01-14T21:22:33.940ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 33193,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:64613 req_id = a8e985ef-ef7c-41c4-a4f3-8af84881e6c7
1982026-01-14T21:22:33.941ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 33193, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_repo-depot._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_repo-depot._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 11, 95, 114, 101, 112, 111, 45, 100, 101, 112, 111, 116, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_repo-depot._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:64613 req_id = a8e985ef-ef7c-41c4-a4f3-8af84881e6c7
1992026-01-14T21:22:33.941ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: a6 b4 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 ............._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:60102 req_id = c3e92fae-4891-40ba-9ea5-266ce9334c05
2002026-01-14T21:22:33.941ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 42676,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:60102 req_id = c3e92fae-4891-40ba-9ea5-266ce9334c05
2012026-01-14T21:22:33.943ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 42676, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_crucible-pantry._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 16, 95, 99, 114, 117, 99, 105, 98, 108, 101, 45, 112, 97, 110, 116, 114, 121, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_crucible-pantry._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:60102 req_id = c3e92fae-4891-40ba-9ea5-266ce9334c05
2022026-01-14T21:22:33.944ZINFOtest_vpc_firewall (DataLoader): created 5 built-in users
2032026-01-14T21:22:33.944ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2042026-01-14T21:22:33.944ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2052026-01-14T21:22:33.949ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2062026-01-14T21:22:33.950ZDEBGtest_vpc_firewall (DataLoader): attempting to create built-in role assignments
2072026-01-14T21:22:33.950ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2082026-01-14T21:22:33.950ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2092026-01-14T21:22:33.953ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2102026-01-14T21:22:34.345ZINFOtest_vpc_firewall (DataLoader): created 4 built-in role assignments
2112026-01-14T21:22:34.345ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2122026-01-14T21:22:34.345ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2132026-01-14T21:22:34.348ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2142026-01-14T21:22:34.348ZDEBGtest_vpc_firewall (DataLoader): attempting to create built-in silos
2152026-01-14T21:22:34.348ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2162026-01-14T21:22:34.348ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2172026-01-14T21:22:34.349ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2182026-01-14T21:22:34.500ZINFOtest_vpc_firewall (DataLoader): created 2 built-in silos
2192026-01-14T21:22:34.500ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2202026-01-14T21:22:34.500ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2212026-01-14T21:22:34.501ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2222026-01-14T21:22:34.520ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2232026-01-14T21:22:34.520ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2242026-01-14T21:22:34.523ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2252026-01-14T21:22:34.523ZDEBGtest_vpc_firewall (DataLoader): attempting to create built-in projects
2262026-01-14T21:22:34.523ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2272026-01-14T21:22:34.523ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2282026-01-14T21:22:34.524ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2292026-01-14T21:22:34.537ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2302026-01-14T21:22:34.537ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2312026-01-14T21:22:34.537ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2322026-01-14T21:22:34.537ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2332026-01-14T21:22:34.539ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2342026-01-14T21:22:34.753ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2352026-01-14T21:22:34.753ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2362026-01-14T21:22:34.753ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2372026-01-14T21:22:34.754ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2382026-01-14T21:22:34.814ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2392026-01-14T21:22:34.849ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2402026-01-14T21:22:34.856ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }
2412026-01-14T21:22:34.858ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2422026-01-14T21:22:34.858ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2432026-01-14T21:22:34.858ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2442026-01-14T21:22:34.860ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2452026-01-14T21:22:34.868ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2462026-01-14T21:22:34.868ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2472026-01-14T21:22:34.868ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2482026-01-14T21:22:34.869ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2492026-01-14T21:22:34.903ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2502026-01-14T21:22:34.907ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) } result = Ok(())
2512026-01-14T21:22:34.907ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2522026-01-14T21:22:34.907ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2532026-01-14T21:22:34.907ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2542026-01-14T21:22:34.934ZINFOtest_vpc_firewall (DataLoader): created built-in services project
2552026-01-14T21:22:34.934ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2562026-01-14T21:22:34.934ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2572026-01-14T21:22:34.937ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2582026-01-14T21:22:34.937ZDEBGtest_vpc_firewall (DataLoader): attempting to create built-in VPCs
2592026-01-14T21:22:34.937ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2602026-01-14T21:22:34.937ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2612026-01-14T21:22:34.938ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2622026-01-14T21:22:34.945ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2632026-01-14T21:22:34.945ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2642026-01-14T21:22:34.946ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2652026-01-14T21:22:34.951ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2662026-01-14T21:22:34.952ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2672026-01-14T21:22:34.952ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2682026-01-14T21:22:34.952ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2692026-01-14T21:22:34.952ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2702026-01-14T21:22:34.981ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2712026-01-14T21:22:34.981ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2722026-01-14T21:22:34.981ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2732026-01-14T21:22:34.982ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2742026-01-14T21:22:34.987ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2752026-01-14T21:22:34.987ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2762026-01-14T21:22:34.987ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2772026-01-14T21:22:34.988ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2782026-01-14T21:22:34.998ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2792026-01-14T21:22:35.010ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2802026-01-14T21:22:35.010ZTRACtest_vpc_firewall (DataLoader): successful lookup of siloed resource "Project" using built-in user
2812026-01-14T21:22:35.010ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }
2822026-01-14T21:22:35.010ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
2832026-01-14T21:22:35.010ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2842026-01-14T21:22:35.010ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2852026-01-14T21:22:35.011ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2862026-01-14T21:22:35.026ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
2872026-01-14T21:22:35.026ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2882026-01-14T21:22:35.027ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2892026-01-14T21:22:35.028ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2902026-01-14T21:22:35.043ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
2912026-01-14T21:22:35.043ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2922026-01-14T21:22:35.043ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2932026-01-14T21:22:35.044ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2942026-01-14T21:22:35.049ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2952026-01-14T21:22:35.057ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) } result = Ok(())
2962026-01-14T21:22:35.057ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
2972026-01-14T21:22:35.057ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
2982026-01-14T21:22:35.057ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
2992026-01-14T21:22:35.077ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
3002026-01-14T21:22:35.077ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3012026-01-14T21:22:35.077ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3022026-01-14T21:22:35.077ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3032026-01-14T21:22:35.088ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3042026-01-14T21:22:35.107ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3052026-01-14T21:22:35.107ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3062026-01-14T21:22:35.107ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3072026-01-14T21:22:35.114ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3082026-01-14T21:22:35.131ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3092026-01-14T21:22:35.131ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3102026-01-14T21:22:35.131ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3112026-01-14T21:22:35.134ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3122026-01-14T21:22:35.159ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3132026-01-14T21:22:35.176ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3142026-01-14T21:22:35.182ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3152026-01-14T21:22:35.182ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3162026-01-14T21:22:35.182ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3172026-01-14T21:22:35.216ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3182026-01-14T21:22:35.216ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3192026-01-14T21:22:35.217ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3202026-01-14T21:22:35.245ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3212026-01-14T21:22:35.245ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3222026-01-14T21:22:35.248ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3232026-01-14T21:22:35.257ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }
3242026-01-14T21:22:35.257ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3252026-01-14T21:22:35.257ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3262026-01-14T21:22:35.257ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3272026-01-14T21:22:35.258ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3282026-01-14T21:22:35.263ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3292026-01-14T21:22:35.264ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3302026-01-14T21:22:35.264ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3312026-01-14T21:22:35.264ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3322026-01-14T21:22:35.284ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3332026-01-14T21:22:35.284ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3342026-01-14T21:22:35.284ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3352026-01-14T21:22:35.285ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3362026-01-14T21:22:35.297ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3372026-01-14T21:22:35.311ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") } result = Ok(())
3382026-01-14T21:22:35.311ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3392026-01-14T21:22:35.311ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3402026-01-14T21:22:35.312ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3412026-01-14T21:22:35.377ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3422026-01-14T21:22:35.377ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3432026-01-14T21:22:35.377ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3442026-01-14T21:22:35.377ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3452026-01-14T21:22:35.378ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3462026-01-14T21:22:35.437ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3472026-01-14T21:22:35.438ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3482026-01-14T21:22:35.438ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3492026-01-14T21:22:35.439ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3502026-01-14T21:22:35.452ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3512026-01-14T21:22:35.452ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3522026-01-14T21:22:35.452ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3532026-01-14T21:22:35.452ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3542026-01-14T21:22:35.464ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3552026-01-14T21:22:35.472ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3562026-01-14T21:22:35.472ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3572026-01-14T21:22:35.472ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3582026-01-14T21:22:35.472ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3592026-01-14T21:22:35.575ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
3602026-01-14T21:22:35.575ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3612026-01-14T21:22:35.575ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3622026-01-14T21:22:35.575ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3632026-01-14T21:22:35.576ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3642026-01-14T21:22:35.597ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3652026-01-14T21:22:35.597ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3662026-01-14T21:22:35.597ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3672026-01-14T21:22:35.598ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3682026-01-14T21:22:35.613ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3692026-01-14T21:22:35.613ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3702026-01-14T21:22:35.614ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3712026-01-14T21:22:35.615ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3722026-01-14T21:22:35.633ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3732026-01-14T21:22:35.657ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
3742026-01-14T21:22:35.658ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3752026-01-14T21:22:35.658ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3762026-01-14T21:22:35.658ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3772026-01-14T21:22:35.670ZDEBGtest_vpc_firewall (DataLoader): attempting to create built-in VPC firewall rules
3782026-01-14T21:22:35.671ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3792026-01-14T21:22:35.671ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3802026-01-14T21:22:35.671ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3812026-01-14T21:22:35.680ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3822026-01-14T21:22:35.680ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3832026-01-14T21:22:35.682ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3842026-01-14T21:22:35.690ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3852026-01-14T21:22:35.690ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3862026-01-14T21:22:35.692ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3872026-01-14T21:22:35.709ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
3882026-01-14T21:22:35.710ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
3892026-01-14T21:22:35.710ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3902026-01-14T21:22:35.710ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3912026-01-14T21:22:35.711ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3922026-01-14T21:22:35.720ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
3932026-01-14T21:22:35.721ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3942026-01-14T21:22:35.721ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3952026-01-14T21:22:35.722ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
3962026-01-14T21:22:35.729ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
3972026-01-14T21:22:35.734ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
3982026-01-14T21:22:35.734ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
3992026-01-14T21:22:35.736ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4002026-01-14T21:22:35.757ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4012026-01-14T21:22:35.774ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4022026-01-14T21:22:35.774ZTRACtest_vpc_firewall (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4032026-01-14T21:22:35.774ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4042026-01-14T21:22:35.774ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4052026-01-14T21:22:35.774ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4062026-01-14T21:22:35.774ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4072026-01-14T21:22:35.775ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4082026-01-14T21:22:35.821ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4092026-01-14T21:22:35.821ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4102026-01-14T21:22:35.821ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4112026-01-14T21:22:35.822ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4122026-01-14T21:22:35.849ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4132026-01-14T21:22:35.849ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4142026-01-14T21:22:35.849ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4152026-01-14T21:22:35.850ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4162026-01-14T21:22:35.869ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4172026-01-14T21:22:35.904ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4182026-01-14T21:22:35.910ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4192026-01-14T21:22:35.910ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4202026-01-14T21:22:35.911ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4212026-01-14T21:22:35.967ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4222026-01-14T21:22:35.968ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4232026-01-14T21:22:35.968ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4242026-01-14T21:22:35.968ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4252026-01-14T21:22:35.968ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4262026-01-14T21:22:35.972ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4272026-01-14T21:22:35.972ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4282026-01-14T21:22:35.972ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4292026-01-14T21:22:35.973ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4302026-01-14T21:22:35.977ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4312026-01-14T21:22:35.977ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4322026-01-14T21:22:35.977ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4332026-01-14T21:22:35.977ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4342026-01-14T21:22:35.990ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4352026-01-14T21:22:36.037ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4362026-01-14T21:22:36.037ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4372026-01-14T21:22:36.037ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4382026-01-14T21:22:36.038ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4392026-01-14T21:22:36.180ZINFOtest_vpc_firewall (DataLoader): created built-in VPC firewall rules
4402026-01-14T21:22:36.180ZDEBGtest_vpc_firewall (DataLoader): attempting to create built-in VPC Subnets
4412026-01-14T21:22:36.180ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4422026-01-14T21:22:36.181ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4432026-01-14T21:22:36.182ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4442026-01-14T21:22:36.188ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4452026-01-14T21:22:36.188ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4462026-01-14T21:22:36.189ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4472026-01-14T21:22:36.199ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4482026-01-14T21:22:36.199ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4492026-01-14T21:22:36.201ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4502026-01-14T21:22:36.210ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4512026-01-14T21:22:36.210ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4522026-01-14T21:22:36.210ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4532026-01-14T21:22:36.210ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4542026-01-14T21:22:36.211ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4552026-01-14T21:22:36.219ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4562026-01-14T21:22:36.219ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4572026-01-14T21:22:36.219ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4582026-01-14T21:22:36.220ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4592026-01-14T21:22:36.223ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4602026-01-14T21:22:36.224ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4612026-01-14T21:22:36.224ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4622026-01-14T21:22:36.224ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4632026-01-14T21:22:36.228ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4642026-01-14T21:22:36.235ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4652026-01-14T21:22:36.235ZTRACtest_vpc_firewall (DataLoader): successful lookup of siloed resource "Vpc" using built-in user
4662026-01-14T21:22:36.235ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4672026-01-14T21:22:36.236ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4682026-01-14T21:22:36.236ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4692026-01-14T21:22:36.247ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
4702026-01-14T21:22:36.248ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4712026-01-14T21:22:36.248ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4722026-01-14T21:22:36.249ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4732026-01-14T21:22:36.250ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4742026-01-14T21:22:36.267ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4752026-01-14T21:22:36.267ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4762026-01-14T21:22:36.267ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4772026-01-14T21:22:36.268ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4782026-01-14T21:22:36.279ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4792026-01-14T21:22:36.279ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4802026-01-14T21:22:36.279ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4812026-01-14T21:22:36.280ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4822026-01-14T21:22:36.299ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4832026-01-14T21:22:36.309ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
4842026-01-14T21:22:36.324ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
4852026-01-14T21:22:36.324ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
4862026-01-14T21:22:36.325ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4872026-01-14T21:22:36.325ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4882026-01-14T21:22:36.325ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4892026-01-14T21:22:36.330ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
4902026-01-14T21:22:36.330ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4912026-01-14T21:22:36.331ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4922026-01-14T21:22:36.332ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4932026-01-14T21:22:36.342ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
4942026-01-14T21:22:36.342ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
4952026-01-14T21:22:36.342ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4962026-01-14T21:22:36.344ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
4972026-01-14T21:22:36.373ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
4982026-01-14T21:22:36.384ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
4992026-01-14T21:22:36.384ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5002026-01-14T21:22:36.384ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5012026-01-14T21:22:36.384ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5022026-01-14T21:22:36.418ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5032026-01-14T21:22:36.419ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5042026-01-14T21:22:36.420ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5052026-01-14T21:22:36.456ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5062026-01-14T21:22:36.456ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5072026-01-14T21:22:36.456ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5082026-01-14T21:22:36.456ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5092026-01-14T21:22:36.457ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5102026-01-14T21:22:36.533ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5112026-01-14T21:22:36.533ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5122026-01-14T21:22:36.533ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5132026-01-14T21:22:36.534ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5142026-01-14T21:22:36.544ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5152026-01-14T21:22:36.545ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5162026-01-14T21:22:36.545ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5172026-01-14T21:22:36.546ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5182026-01-14T21:22:36.553ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5192026-01-14T21:22:36.568ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5202026-01-14T21:22:36.589ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5212026-01-14T21:22:36.589ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5222026-01-14T21:22:36.589ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5232026-01-14T21:22:36.589ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5242026-01-14T21:22:36.590ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5252026-01-14T21:22:36.642ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5262026-01-14T21:22:36.642ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5272026-01-14T21:22:36.643ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5282026-01-14T21:22:36.644ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5292026-01-14T21:22:36.678ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5302026-01-14T21:22:36.679ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5312026-01-14T21:22:36.679ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5322026-01-14T21:22:36.680ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5332026-01-14T21:22:36.688ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5342026-01-14T21:22:36.714ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5352026-01-14T21:22:36.714ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5362026-01-14T21:22:36.714ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5372026-01-14T21:22:36.714ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5382026-01-14T21:22:36.730ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5392026-01-14T21:22:36.757ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5402026-01-14T21:22:36.757ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5412026-01-14T21:22:36.775ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
5422026-01-14T21:22:36.776ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5432026-01-14T21:22:36.776ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5442026-01-14T21:22:36.776ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5452026-01-14T21:22:36.777ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5462026-01-14T21:22:36.783ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5472026-01-14T21:22:36.783ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5482026-01-14T21:22:36.783ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5492026-01-14T21:22:36.784ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5502026-01-14T21:22:36.860ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5512026-01-14T21:22:36.860ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5522026-01-14T21:22:36.860ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5532026-01-14T21:22:36.861ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5542026-01-14T21:22:36.880ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5552026-01-14T21:22:36.901ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
5562026-01-14T21:22:36.926ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) }
5572026-01-14T21:22:36.926ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
5582026-01-14T21:22:36.926ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5592026-01-14T21:22:36.926ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5602026-01-14T21:22:36.927ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5612026-01-14T21:22:36.937ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
5622026-01-14T21:22:36.937ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5632026-01-14T21:22:36.937ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5642026-01-14T21:22:36.938ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5652026-01-14T21:22:36.942ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
5662026-01-14T21:22:36.942ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5672026-01-14T21:22:36.942ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5682026-01-14T21:22:36.943ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5692026-01-14T21:22:36.948ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5702026-01-14T21:22:36.960ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-074c-4000-8000-000000000001, lookup_type: ById(001de000-074c-4000-8000-000000000001) } result = Ok(())
5712026-01-14T21:22:36.963ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5722026-01-14T21:22:36.964ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5732026-01-14T21:22:36.965ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5742026-01-14T21:22:37.034ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5752026-01-14T21:22:37.034ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5762026-01-14T21:22:37.034ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5772026-01-14T21:22:37.040ZINFOtest_vpc_firewall (DataLoader): created built-in services vpc subnets
5782026-01-14T21:22:37.041ZINFOtest_vpc_firewall (DataLoader): created built-in services vpc
5792026-01-14T21:22:37.041ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5802026-01-14T21:22:37.041ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5812026-01-14T21:22:37.043ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5822026-01-14T21:22:37.043ZDEBGtest_vpc_firewall (DataLoader): attempting to create silo users
5832026-01-14T21:22:37.043ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5842026-01-14T21:22:37.044ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5852026-01-14T21:22:37.044ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5862026-01-14T21:22:37.130ZINFOtest_vpc_firewall (DataLoader): created 2 silo users
5872026-01-14T21:22:37.130ZDEBGtest_vpc_firewall (DataLoader): attempting to create silo user role assignments
5882026-01-14T21:22:37.130ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5892026-01-14T21:22:37.130ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5902026-01-14T21:22:37.131ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5912026-01-14T21:22:37.147ZINFOtest_vpc_firewall (DataLoader): created 2 silo user role assignments
5922026-01-14T21:22:37.147ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5932026-01-14T21:22:37.147ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5942026-01-14T21:22:37.148ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5952026-01-14T21:22:37.172ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
5962026-01-14T21:22:37.172ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
5972026-01-14T21:22:37.174ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
5982026-01-14T21:22:37.193ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList
5992026-01-14T21:22:37.194ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6002026-01-14T21:22:37.194ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6012026-01-14T21:22:37.194ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
6022026-01-14T21:22:37.195ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6032026-01-14T21:22:37.220ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
6042026-01-14T21:22:37.223ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList result = Ok(())
6052026-01-14T21:22:37.223ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6062026-01-14T21:22:37.223ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
6072026-01-14T21:22:37.223ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6082026-01-14T21:22:37.447ZTRACtest_vpc_firewall (DataLoader): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList
6092026-01-14T21:22:37.447ZTRACtest_vpc_firewall (DataLoader): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6102026-01-14T21:22:37.447ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6112026-01-14T21:22:37.447ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
6122026-01-14T21:22:37.449ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6132026-01-14T21:22:37.468ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
6142026-01-14T21:22:37.471ZDEBGtest_vpc_firewall (DataLoader): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = IpPoolList result = Ok(())
6152026-01-14T21:22:37.471ZTRACtest_vpc_firewall (DataLoader): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database
6162026-01-14T21:22:37.471ZDEBGtest_vpc_firewall (DataLoader): roles roles = RoleSet { roles: {} }
6172026-01-14T21:22:37.471ZDEBGtest_vpc_firewall (DataLoader): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000001 (built_in_user), .. }) resource = Database result = Ok(())
6182026-01-14T21:22:37.508ZINFOtest_vpc_firewall (nexus): populate complete
6192026-01-14T21:22:37.508ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig
6202026-01-14T21:22:37.508ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6212026-01-14T21:22:37.508ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
6222026-01-14T21:22:37.508ZDEBGtest_vpc_firewall (BackgroundTasks): roles roles = RoleSet { roles: {} }
6232026-01-14T21:22:37.509ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
6242026-01-14T21:22:37.516ZDEBGtest_vpc_firewall (init_with_steps): Running step start_gateway_switch0
6252026-01-14T21:22:37.516ZDEBGtest_vpc_firewall: Starting Management Gateway
6262026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (BackgroundTasks): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
6272026-01-14T21:22:37.582ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig result = Ok(())
6282026-01-14T21:22:37.583ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
6292026-01-14T21:22:37.583ZDEBGtest_vpc_firewall (BackgroundTasks): roles roles = RoleSet { roles: {} }
6302026-01-14T21:22:37.584ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
6312026-01-14T21:22:37.607ZINFOtest_vpc_firewall (nexus): activating background tasks
6322026-01-14T21:22:37.614ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 1 reason = Timeout
6332026-01-14T21:22:37.614ZWARNtest_vpc_firewall (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config nor servers
6342026-01-14T21:22:37.614ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 334.388\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
6352026-01-14T21:22:37.614ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_executor iteration = 1 reason = Timeout
6362026-01-14T21:22:37.614ZWARNtest_vpc_firewall (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = no blueprint
6372026-01-14T21:22:37.614ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 79.055\u{b5}s iteration = 1 status = {"error":"no blueprint"}
6382026-01-14T21:22:37.614ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = inventory_collection iteration = 1 reason = Timeout
6392026-01-14T21:22:37.614ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
6402026-01-14T21:22:37.614ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6412026-01-14T21:22:37.614ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
6422026-01-14T21:22:37.614ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
6432026-01-14T21:22:37.616ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
6442026-01-14T21:22:37.619ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = inventory_loader iteration = 1 reason = Timeout
6452026-01-14T21:22:37.619ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory
6462026-01-14T21:22:37.619ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6472026-01-14T21:22:37.619ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
6482026-01-14T21:22:37.619ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
6492026-01-14T21:22:37.620ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
6502026-01-14T21:22:37.621ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_planner iteration = 1 reason = Timeout
6512026-01-14T21:22:37.621ZDEBGtest_vpc_firewall (BackgroundTasks): reconfigurator config not yet loaded; doing nothing background_task = blueprint_planner
6522026-01-14T21:22:37.621ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 125.166\u{b5}s iteration = 1 status = "Disabled"
6532026-01-14T21:22:37.621ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_loader iteration = 1 reason = Timeout
6542026-01-14T21:22:37.621ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig
6552026-01-14T21:22:37.621ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6562026-01-14T21:22:37.621ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
6572026-01-14T21:22:37.621ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
6582026-01-14T21:22:37.622ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
6592026-01-14T21:22:37.630ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 1 reason = Timeout
6602026-01-14T21:22:37.630ZWARNtest_vpc_firewall (BackgroundTasks): Blueprint execution: skipped background_task = crdb_node_id_collector reason = no blueprint
6612026-01-14T21:22:37.630ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 149.444\u{b5}s iteration = 1 status = {"error":"no blueprint"}
6622026-01-14T21:22:37.630ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = support_bundle_collector iteration = 1 reason = Timeout
6632026-01-14T21:22:37.631ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet
6642026-01-14T21:22:37.631ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6652026-01-14T21:22:37.631ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database
6662026-01-14T21:22:37.631ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
6672026-01-14T21:22:37.632ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
6682026-01-14T21:22:37.634ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 1 reason = Timeout
6692026-01-14T21:22:37.635ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 1.246413ms iteration = 1 status = {"error":"task disabled"}
6702026-01-14T21:22:37.635ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 1 reason = Timeout
6712026-01-14T21:22:37.636ZWARNtest_vpc_firewall (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
6722026-01-14T21:22:37.636ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 281.433\u{b5}s iteration = 1 status = {"error":"no blueprint"}
6732026-01-14T21:22:37.636ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = vpc_route_manager iteration = 1 reason = Timeout
6742026-01-14T21:22:37.636ZINFOtest_vpc_firewall (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
6752026-01-14T21:22:37.636ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet
6762026-01-14T21:22:37.636ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
6772026-01-14T21:22:37.636ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
6782026-01-14T21:22:37.636ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
6792026-01-14T21:22:37.638ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
6802026-01-14T21:22:37.639ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = tuf_repo_pruner iteration = 1 reason = Timeout
6812026-01-14T21:22:37.639ZINFOtest_vpc_firewall (BackgroundTasks): reconfigurator config not yet loaded; doing nothing background_task = tuf_repo_pruner
6822026-01-14T21:22:37.639ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = tuf_repo_pruner elapsed = 308.137\u{b5}s iteration = 1 status = {"reason":"reconfigurator config not yet loaded","status":"disabled"}
6832026-01-14T21:22:37.639ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = multicast_reconciler iteration = 1 reason = Timeout
6842026-01-14T21:22:37.639ZTRACtest_vpc_firewall (BackgroundTasks): multicast group reconciler activating background_task = multicast_reconciler
6852026-01-14T21:22:37.640ZTRACtest_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass background_task = multicast_reconciler
6862026-01-14T21:22:37.640ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
6872026-01-14T21:22:37.640ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = fm_sitrep_gc iteration = 1 reason = Timeout
6882026-01-14T21:22:37.640ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
6892026-01-14T21:22:37.641ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
6902026-01-14T21:22:37.641ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
6912026-01-14T21:22:37.643ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 1 reason = Timeout
6922026-01-14T21:22:37.643ZDEBGtest_vpc_firewall (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
6932026-01-14T21:22:37.643ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
6942026-01-14T21:22:37.643ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
6952026-01-14T21:22:37.644ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
6962026-01-14T21:22:37.647ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 1 reason = Timeout
6972026-01-14T21:22:37.647ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
6982026-01-14T21:22:37.648ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 1 reason = Timeout
6992026-01-14T21:22:37.648ZWARNtest_vpc_firewall (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config nor servers
7002026-01-14T21:22:37.648ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 260.131\u{b5}s iteration = 1 status = {"error":"no config nor servers"}
7012026-01-14T21:22:37.648ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 1 reason = Timeout
7022026-01-14T21:22:37.648ZDEBGtest_vpc_firewall (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
7032026-01-14T21:22:37.648ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
7042026-01-14T21:22:37.648ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
7052026-01-14T21:22:37.650ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
7062026-01-14T21:22:37.650ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 1 reason = Timeout
7072026-01-14T21:22:37.651ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
7082026-01-14T21:22:37.651ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = metrics_producer_gc iteration = 1 reason = Timeout
7092026-01-14T21:22:37.651ZINFOtest_vpc_firewall (BackgroundTasks): Metric producer GC running background_task = metrics_producer_gc expiration = 2026-01-14 21:12:37.651535994 UTC
7102026-01-14T21:22:37.651ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = metrics_producer_gc resource = Database
7112026-01-14T21:22:37.652ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = metrics_producer_gc roles = RoleSet { roles: {} }
7122026-01-14T21:22:37.652ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = metrics_producer_gc resource = Database result = Ok(())
7132026-01-14T21:22:37.667ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = external_endpoints iteration = 1 reason = Timeout
7142026-01-14T21:22:37.667ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet
7152026-01-14T21:22:37.667ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7162026-01-14T21:22:37.667ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
7172026-01-14T21:22:37.668ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
7182026-01-14T21:22:37.668ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
7192026-01-14T21:22:37.670ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = nat_garbage_collector iteration = 1 reason = Timeout
7202026-01-14T21:22:37.673ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = nat_garbage_collector resource = Database
7212026-01-14T21:22:37.674ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = nat_garbage_collector roles = RoleSet { roles: {} }
7222026-01-14T21:22:37.675ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = nat_garbage_collector resource = Database result = Ok(())
7232026-01-14T21:22:37.676ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = bfd_manager iteration = 1 reason = Timeout
7242026-01-14T21:22:37.676ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = bfd_manager resource = Database
7252026-01-14T21:22:37.676ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = bfd_manager roles = RoleSet { roles: {} }
7262026-01-14T21:22:37.677ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = bfd_manager resource = Database result = Ok(())
7272026-01-14T21:22:37.678ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = phantom_disks iteration = 1 reason = Timeout
7282026-01-14T21:22:37.679ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 1 reason = Timeout
7292026-01-14T21:22:37.679ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig
7302026-01-14T21:22:37.679ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = reconfigurator_config_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7312026-01-14T21:22:37.679ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
7322026-01-14T21:22:37.679ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
7332026-01-14T21:22:37.680ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
7342026-01-14T21:22:37.681ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = decommissioned_disk_cleaner iteration = 1 reason = Timeout
7352026-01-14T21:22:37.681ZINFOtest_vpc_firewall (BackgroundTasks): Decommissioned Disk Cleaner disabled background_task = decommissioned_disk_cleaner
7362026-01-14T21:22:37.681ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = decommissioned_disk_cleaner elapsed = 203.381\u{b5}s iteration = 1 status = {"deleted":0,"error":null,"error_count":0,"found":0,"not_ready_to_be_deleted":0}
7372026-01-14T21:22:37.681ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = service_zone_nat_tracker iteration = 1 reason = Timeout
7382026-01-14T21:22:37.681ZWARNtest_vpc_firewall (BackgroundTasks): inventory collection is None background_task = service_zone_nat_tracker
7392026-01-14T21:22:37.681ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = service_zone_nat_tracker elapsed = 66.961\u{b5}s iteration = 1 status = {"error":"inventory collection is None"}
7402026-01-14T21:22:37.681ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = switch_port_config_manager iteration = 1 reason = Timeout
7412026-01-14T21:22:37.682ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Fleet
7422026-01-14T21:22:37.682ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = switch_port_config_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7432026-01-14T21:22:37.682ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database
7442026-01-14T21:22:37.682ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
7452026-01-14T21:22:37.683ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
7462026-01-14T21:22:37.684ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = v2p_manager iteration = 1 reason = Timeout
7472026-01-14T21:22:37.685ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
7482026-01-14T21:22:37.685ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
7492026-01-14T21:22:37.685ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
7502026-01-14T21:22:37.686ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = region_replacement iteration = 1 reason = Timeout
7512026-01-14T21:22:37.686ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database
7522026-01-14T21:22:37.686ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
7532026-01-14T21:22:37.687ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database result = Ok(())
7542026-01-14T21:22:37.688ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = region_replacement_driver iteration = 1 reason = Timeout
7552026-01-14T21:22:37.688ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database
7562026-01-14T21:22:37.688ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
7572026-01-14T21:22:37.688ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database result = Ok(())
7582026-01-14T21:22:37.689ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = instance_watcher iteration = 1 reason = Timeout
7592026-01-14T21:22:37.689ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Fleet
7602026-01-14T21:22:37.689ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = instance_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
7612026-01-14T21:22:37.689ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database
7622026-01-14T21:22:37.690ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
7632026-01-14T21:22:37.690ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database result = Ok(())
7642026-01-14T21:22:37.691ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = instance_updater iteration = 1 reason = Timeout
7652026-01-14T21:22:37.691ZINFOtest_vpc_firewall (BackgroundTasks): background instance updater explicitly disabled background_task = instance_updater
7662026-01-14T21:22:37.691ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = instance_updater elapsed = 371.07\u{b5}s iteration = 1 status = {"destroyed_active_vmms":0,"disabled":true,"failed_active_vmms":0,"query_errors":[],"saga_errors":[],"sagas_completed":0,"sagas_started":0,"terminated_active_migrations":0}
7672026-01-14T21:22:37.691ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = instance_reincarnation iteration = 1 reason = Timeout
7682026-01-14T21:22:37.692ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database
7692026-01-14T21:22:37.692ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
7702026-01-14T21:22:37.692ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database result = Ok(())
7712026-01-14T21:22:37.693ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = service_firewall_rule_propagation iteration = 1 reason = Timeout
7722026-01-14T21:22:37.693ZDEBGtest_vpc_firewall (service-firewall-rule-progator): starting background task for service firewall rule propagation background_task = service_firewall_rule_propagation
7732026-01-14T21:22:37.693ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
7742026-01-14T21:22:37.693ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
7752026-01-14T21:22:37.694ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
7762026-01-14T21:22:37.694ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = abandoned_vmm_reaper iteration = 1 reason = Timeout
7772026-01-14T21:22:37.695ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = abandoned_vmm_reaper resource = Database
7782026-01-14T21:22:37.695ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = abandoned_vmm_reaper roles = RoleSet { roles: {} }
7792026-01-14T21:22:37.696ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = abandoned_vmm_reaper resource = Database result = Ok(())
7802026-01-14T21:22:37.696ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = saga_recovery iteration = 1 reason = Timeout
7812026-01-14T21:22:37.696ZINFOtest_vpc_firewall (SagaQuiesceHandle): saga recovery pass starting
7822026-01-14T21:22:37.696ZDEBGtest_vpc_firewall (SagaRecoverer): listing candidate sagas for recovery
7832026-01-14T21:22:37.697ZTRACtest_vpc_firewall (SagaRecoverer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. }) resource = Database
7842026-01-14T21:22:37.697ZDEBGtest_vpc_firewall (SagaRecoverer): roles roles = RoleSet { roles: {} }
7852026-01-14T21:22:37.697ZDEBGtest_vpc_firewall (SagaRecoverer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000003a8a (built_in_user), .. }) resource = Database result = Ok(())
7862026-01-14T21:22:37.826ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = lookup_region_port iteration = 1 reason = Timeout
7872026-01-14T21:22:37.826ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = lookup_region_port resource = Database
7882026-01-14T21:22:37.827ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = lookup_region_port roles = RoleSet { roles: {} }
7892026-01-14T21:22:37.858ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = lookup_region_port resource = Database result = Ok(())
7902026-01-14T21:22:37.859ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = region_snapshot_replacement_start iteration = 1 reason = Timeout
7912026-01-14T21:22:37.859ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database
7922026-01-14T21:22:37.860ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
7932026-01-14T21:22:37.860ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
7942026-01-14T21:22:37.861ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = region_snapshot_replacement_garbage_collection iteration = 1 reason = Timeout
7952026-01-14T21:22:37.861ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database
7962026-01-14T21:22:37.861ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_snapshot_replacement_garbage_collection roles = RoleSet { roles: {} }
7972026-01-14T21:22:37.862ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_garbage_collection resource = Database result = Ok(())
7982026-01-14T21:22:37.863ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = region_snapshot_replacement_step iteration = 1 reason = Timeout
7992026-01-14T21:22:37.863ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database
8002026-01-14T21:22:37.864ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
8012026-01-14T21:22:37.864ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
8022026-01-14T21:22:37.865ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = region_snapshot_replacement_finish iteration = 1 reason = Timeout
8032026-01-14T21:22:37.865ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_finish resource = Database
8042026-01-14T21:22:37.865ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_snapshot_replacement_finish roles = RoleSet { roles: {} }
8052026-01-14T21:22:37.866ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_finish resource = Database result = Ok(())
8062026-01-14T21:22:37.867ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = tuf_artifact_replication iteration = 1 reason = Timeout
8072026-01-14T21:22:37.867ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
8082026-01-14T21:22:37.867ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8092026-01-14T21:22:37.867ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
8102026-01-14T21:22:37.867ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
8112026-01-14T21:22:37.867ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
8122026-01-14T21:22:37.868ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = read_only_region_replacement_start iteration = 1 reason = Timeout
8132026-01-14T21:22:37.869ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = read_only_region_replacement_start resource = Database
8142026-01-14T21:22:37.869ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = read_only_region_replacement_start roles = RoleSet { roles: {} }
8152026-01-14T21:22:37.869ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = read_only_region_replacement_start resource = Database result = Ok(())
8162026-01-14T21:22:37.870ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = alert_dispatcher iteration = 1 reason = Timeout
8172026-01-14T21:22:37.870ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database
8182026-01-14T21:22:37.870ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = alert_dispatcher roles = RoleSet { roles: {} }
8192026-01-14T21:22:37.875ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database result = Ok(())
8202026-01-14T21:22:37.876ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = webhook_deliverator iteration = 1 reason = Timeout
8212026-01-14T21:22:37.881ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = webhook_deliverator resource = Database
8222026-01-14T21:22:37.882ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = webhook_deliverator roles = RoleSet { roles: {} }
8232026-01-14T21:22:37.882ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = webhook_deliverator resource = Database result = Ok(())
8242026-01-14T21:22:37.884ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = sp_ereport_ingester iteration = 1 reason = Timeout
8252026-01-14T21:22:37.884ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
8262026-01-14T21:22:37.884ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = fm_sitrep_loader iteration = 1 reason = Timeout
8272026-01-14T21:22:37.884ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet
8282026-01-14T21:22:37.884ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8292026-01-14T21:22:37.884ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database
8302026-01-14T21:22:37.884ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
8312026-01-14T21:22:37.900ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
8322026-01-14T21:22:37.902ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = probe_distributor iteration = 1 reason = Timeout
8332026-01-14T21:22:37.902ZINFOtest_vpc_firewall (BackgroundTasks): distributing networking probes to sleds background_task = probe_distributor
8342026-01-14T21:22:37.902ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet
8352026-01-14T21:22:37.902ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = probe_distributor resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8362026-01-14T21:22:37.902ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database
8372026-01-14T21:22:37.902ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
8382026-01-14T21:22:37.903ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
8392026-01-14T21:22:38.066ZDEBGtest_vpc_firewall (init_with_steps): Running step start_dendrite_switch0
8402026-01-14T21:22:38.066ZDEBGtest_vpc_firewall: Starting Dendrite for switch0
8412026-01-14T21:22:38.093ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8422026-01-14T21:22:38.104ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
8432026-01-14T21:22:38.105ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
8442026-01-14T21:22:38.105ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
8452026-01-14T21:22:38.106ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
8462026-01-14T21:22:38.125ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 75 a7 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 u............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:38130 req_id = ae498753-954e-46a7-b08a-7735d51d2e4c
8472026-01-14T21:22:38.125ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 30119,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:38130 req_id = ae498753-954e-46a7-b08a-7735d51d2e4c
8482026-01-14T21:22:38.126ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 30119, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:38130 req_id = ae498753-954e-46a7-b08a-7735d51d2e4c
8492026-01-14T21:22:38.127ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 91 f4 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 ............._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:26537 req_id = ccd53fe7-53aa-4186-ae9b-96514345a5e3
8502026-01-14T21:22:38.127ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 37364,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:26537 req_id = ccd53fe7-53aa-4186-ae9b-96514345a5e3
8512026-01-14T21:22:38.128ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 37364, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_nameservice._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 12, 95, 110, 97, 109, 101, 115, 101, 114, 118, 105, 99, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_nameservice._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:26537 req_id = ccd53fe7-53aa-4186-ae9b-96514345a5e3
8522026-01-14T21:22:38.128ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 71 ab 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 q............_ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:34664 req_id = cca7fe12-0f17-49b8-ba04-3dd6500514b5
8532026-01-14T21:22:38.128ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 29099,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:34664 req_id = cca7fe12-0f17-49b8-ba04-3dd6500514b5
8542026-01-14T21:22:38.129ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 29099, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_external-dns._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 13, 95, 101, 120, 116, 101, 114, 110, 97, 108, 45, 100, 110, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_external-dns._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:34664 req_id = cca7fe12-0f17-49b8-ba04-3dd6500514b5
8552026-01-14T21:22:38.129ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 09 54 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 .T..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:6783 req_id = 34df2e1f-7306-405c-b166-101ca139b5e3
8562026-01-14T21:22:38.129ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 2388,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:6783 req_id = 34df2e1f-7306-405c-b166-101ca139b5e3
8572026-01-14T21:22:38.130ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 2388, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:6783 req_id = 34df2e1f-7306-405c-b166-101ca139b5e3
8582026-01-14T21:22:38.138ZERROtest_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = multicast_reconciler error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8592026-01-14T21:22:38.139ZERROtest_vpc_firewall (BackgroundTasks): failed to build DPD clients background_task = multicast_reconciler error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8602026-01-14T21:22:38.139ZERROtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed with dataplane inconsistencies active_groups_verified = 0 background_task = multicast_reconciler dataplane_error_count = 1 external_groups_created = 0 external_groups_deleted = 0 member_state_transitions = 0 orphaned_members_cleaned = 0
8612026-01-14T21:22:38.139ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 499.930497ms iteration = 1 status = {"disabled":false,"errors":["failed to create multicast dataplane client: Internal Error: failed to build DPD clients"],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
8622026-01-14T21:22:38.140ZWARNtest_vpc_firewall (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_internal dns_group = internal error = proto error: no records found for Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8632026-01-14T21:22:38.140ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 492.982006ms iteration = 1 status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_nameservice._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8642026-01-14T21:22:38.140ZWARNtest_vpc_firewall (BackgroundTasks): failed to lookup DNS servers background_task = dns_servers_external dns_group = external error = proto error: no records found for Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
8652026-01-14T21:22:38.140ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 489.956934ms iteration = 1 status = {"error":"failed to read list of DNS servers: proto error: no records found for Query { name: Name(\\"_external-dns._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
8662026-01-14T21:22:38.141ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
8672026-01-14T21:22:38.141ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8682026-01-14T21:22:38.141ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
8692026-01-14T21:22:38.141ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
8702026-01-14T21:22:38.143ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
8712026-01-14T21:22:38.144ZERROtest_vpc_firewall (BackgroundTasks): failed to resolve MGS addresses background_task = sp_ereport_ingester error = Resolve(ResolveError { kind: Proto(ProtoError { kind: NoRecordsFound { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, soa: None, ns: None, negative_ttl: None, response_code: ServFail, trusted: true, authorities: None } }) })
8722026-01-14T21:22:38.145ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = sp_ereport_ingester elapsed = 261.152181ms iteration = 1 status = {"disabled":false,"errors":["failed to resolve MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"],"sps":[]}
8732026-01-14T21:22:38.147ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet
8742026-01-14T21:22:38.147ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_gc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8752026-01-14T21:22:38.147ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
8762026-01-14T21:22:38.147ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
8772026-01-14T21:22:38.148ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
8782026-01-14T21:22:38.152ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
8792026-01-14T21:22:38.152ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
8802026-01-14T21:22:38.152ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
8812026-01-14T21:22:38.152ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
8822026-01-14T21:22:38.154ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
8832026-01-14T21:22:38.162ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8842026-01-14T21:22:38.186ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory result = Ok(())
8852026-01-14T21:22:38.187ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
8862026-01-14T21:22:38.187ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
8872026-01-14T21:22:38.188ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
8882026-01-14T21:22:38.229ZDEBGtest_vpc_firewall (init_with_steps): Running step start_mgd_switch0
8892026-01-14T21:22:38.230ZDEBGtest_vpc_firewall: Starting mgd for switch0
8902026-01-14T21:22:38.253ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8912026-01-14T21:22:38.261ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
8922026-01-14T21:22:38.261ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
8932026-01-14T21:22:38.261ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
8942026-01-14T21:22:38.262ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
8952026-01-14T21:22:38.269ZINFOtest_vpc_firewall (BackgroundTasks): Metric producer GC complete (no errors) background_task = metrics_producer_gc expiration = 2026-01-14 21:12:37.651535994 UTC pruned = {}
8962026-01-14T21:22:38.270ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = metrics_producer_gc elapsed = 618.740957ms iteration = 1 status = {"expiration":"2026-01-14T21:12:37.651535994Z","pruned":[]}
8972026-01-14T21:22:38.294ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
8982026-01-14T21:22:38.311ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
8992026-01-14T21:22:38.311ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database
9002026-01-14T21:22:38.311ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
9012026-01-14T21:22:38.311ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
9022026-01-14T21:22:38.314ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9032026-01-14T21:22:38.319ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
9042026-01-14T21:22:38.319ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet
9052026-01-14T21:22:38.319ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
9062026-01-14T21:22:38.319ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
9072026-01-14T21:22:38.319ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
9082026-01-14T21:22:38.320ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
9092026-01-14T21:22:38.326ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9102026-01-14T21:22:38.333ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet result = Ok(())
9112026-01-14T21:22:38.333ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
9122026-01-14T21:22:38.333ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
9132026-01-14T21:22:38.334ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
9142026-01-14T21:22:38.335ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
9152026-01-14T21:22:38.336ZTRACtest_vpc_firewall (DnsResolver): lookup_all_ipv6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
9162026-01-14T21:22:38.337ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9172026-01-14T21:22:38.344ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
9182026-01-14T21:22:38.345ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
9192026-01-14T21:22:38.345ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
9202026-01-14T21:22:38.345ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
9212026-01-14T21:22:38.374ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = phantom_disks elapsed = 696.131741ms iteration = 1 status = {"phantom_disk_deleted_err":0,"phantom_disk_deleted_ok":0}
9222026-01-14T21:22:38.407ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9232026-01-14T21:22:38.414ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Fleet result = Ok(())
9242026-01-14T21:22:38.414ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database
9252026-01-14T21:22:38.414ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = instance_watcher roles = RoleSet { roles: {} }
9262026-01-14T21:22:38.415ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_watcher resource = Database result = Ok(())
9272026-01-14T21:22:38.433ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: af 99 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:62550 req_id = 1570770d-4ebf-481f-bc1f-774cfe37267f
9282026-01-14T21:22:38.433ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 44953,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:62550 req_id = 1570770d-4ebf-481f-bc1f-774cfe37267f
9292026-01-14T21:22:38.433ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 44953, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:62550 req_id = 1570770d-4ebf-481f-bc1f-774cfe37267f
9302026-01-14T21:22:38.434ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 1d 4c 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .L..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:10523 req_id = 28517b4f-91c3-4fcd-b3d1-950da071f0e4
9312026-01-14T21:22:38.434ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 7500,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:10523 req_id = 28517b4f-91c3-4fcd-b3d1-950da071f0e4
9322026-01-14T21:22:38.434ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 7500, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_dendrite._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 9, 95, 100, 101, 110, 100, 114, 105, 116, 101, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_dendrite._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:10523 req_id = 28517b4f-91c3-4fcd-b3d1-950da071f0e4
9332026-01-14T21:22:38.443ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
9342026-01-14T21:22:38.452ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Fleet result = Ok(())
9352026-01-14T21:22:38.452ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database
9362026-01-14T21:22:38.452ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = switch_port_config_manager roles = RoleSet { roles: {} }
9372026-01-14T21:22:38.452ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = switch_port_config_manager resource = Database result = Ok(())
9382026-01-14T21:22:38.506ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
9392026-01-14T21:22:38.506ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
9402026-01-14T21:22:38.508ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
9412026-01-14T21:22:38.513ZERROtest_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_garbage_collector error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9422026-01-14T21:22:38.514ZERROtest_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = nat_garbage_collector error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9432026-01-14T21:22:38.514ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = nat_garbage_collector elapsed = 844.327069ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
9442026-01-14T21:22:38.515ZERROtest_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9452026-01-14T21:22:38.515ZERROtest_vpc_firewall (BackgroundTasks): failed to resolve addresses for Dendrite services background_task = bfd_manager error = proto error: no records found for Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
9462026-01-14T21:22:38.516ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = bfd_manager elapsed = 839.167217ms iteration = 1 status = {"error":"failed to resolve addresses for Dendrite services: proto error: no records found for Query { name: Name(\\"_dendrite._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
9472026-01-14T21:22:38.544ZDEBGtest_vpc_firewall: mgd port is 39674
9482026-01-14T21:22:38.544ZDEBGtest_vpc_firewall (init_with_steps): Running step record_switch_dns
9492026-01-14T21:22:38.544ZDEBGtest_vpc_firewall: Recording DNS for the switch zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 switch_location = switch0
9502026-01-14T21:22:38.544ZDEBGtest_vpc_firewall (init_with_steps): Running step start_sled1
9512026-01-14T21:22:38.545ZINFOtest_vpc_firewall (omicron_sled_agent::sim::Server): setting up sled agent server sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9522026-01-14T21:22:38.660ZINFOtest_vpc_firewall (SledAgent): created simulated sled agent server = b6d65341-167c-41df-9b5c-41cded99c229 sim_mode = Explicit sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9532026-01-14T21:22:38.661ZINFOtest_vpc_firewall (omicron_sled_agent::sim::SimulatedUpstairs): registered sled b6d65341-167c-41df-9b5c-41cded99c229 storage
9542026-01-14T21:22:38.676ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = lookup_region_port elapsed = 850.171008ms iteration = 1 status = {"errors":[],"found_port_ok":[]}
9552026-01-14T21:22:38.688ZINFOtest_vpc_firewall (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmp3wosp4/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9562026-01-14T21:22:38.688ZDEBGtest_vpc_firewall (ArtifactStore): Failed to read ledger: Not found in storage path = /var/tmp/omicron_tmp/.tmp3wosp4/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9572026-01-14T21:22:38.688ZINFOtest_vpc_firewall (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpDRDbDf/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9582026-01-14T21:22:38.688ZDEBGtest_vpc_firewall (ArtifactStore): Failed to read ledger: Not found in storage path = /var/tmp/omicron_tmp/.tmpDRDbDf/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9592026-01-14T21:22:38.800ZDEBGtest_vpc_firewall (dropshot (Repo Depot)): registered endpoint local_addr = [::1]:52160 method = GET path = /artifact/sha256/{sha256} server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9602026-01-14T21:22:38.800ZINFOtest_vpc_firewall (dropshot (Repo Depot)): listening local_addr = [::1]:52160 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9612026-01-14T21:22:38.804ZDEBGtest_vpc_firewall (dropshot (Repo Depot)): successfully registered DTrace USDT probes local_addr = [::1]:52160 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
9622026-01-14T21:22:38.822ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /artifacts sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9632026-01-14T21:22:38.822ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /artifacts/{sha256} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9642026-01-14T21:22:38.822ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /artifacts/{sha256}/copy-from-depot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9652026-01-14T21:22:38.822ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /artifacts-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9662026-01-14T21:22:38.822ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /artifacts-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9672026-01-14T21:22:38.822ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /bootstore/status sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9682026-01-14T21:22:38.822ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /chicken-switch/destroy-orphaned-datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 2.0.0
9692026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /chicken-switch/destroy-orphaned-datasets sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 3.0.0
9702026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /debug/switch-zone-policy sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 3.0.0
9712026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /debug/switch-zone-policy sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 3.0.0
9722026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /disks/{disk_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9732026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /disks/{disk_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9742026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /eip-gateways sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9752026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 12.0.0
9762026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 11.0.0 to 12.0.0
9772026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 10.0.0 to 11.0.0
9782026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 4.0.0 to 10.0.0
9792026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /inventory sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 4.0.0
9802026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = DELETE path = /local-storage/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 9.0.0
9812026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /local-storage/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 9.0.0
9822026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9832026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /network-bootstore-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9842026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 11.0.0
9852026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 10.0.0 to 11.0.0
9862026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 4.0.0 to 10.0.0
9872026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /omicron-config sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 4.0.0
9882026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /probes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 10.0.0
9892026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /probes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 6.0.0 to 10.0.0
9902026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /sled-identifiers sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9912026-01-14T21:22:38.823ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /sled-role sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 8.0.0
9922026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /sleds sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9932026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/dladm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9942026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/health-check sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9952026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/ipadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9962026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/logs/download/{zone} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9972026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/logs/zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9982026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/nvmeadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
9992026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/pargs-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10002026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/pfiles-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10012026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/pstack-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10022026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/zfs-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10032026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/zoneadm-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10042026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support/zpool-info sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10052026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support-bundles/{zpool_id}/{dataset_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10062026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = DELETE path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10072026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10082026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10092026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10102026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10112026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/download/{file} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10122026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/finalize sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10132026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10142026-01-14T21:22:38.824ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = HEAD path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/index sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10152026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /support-bundles/{zpool_id}/{dataset_id}/{support_bundle_id}/transfer sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10162026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /switch-ports sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10172026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = DELETE path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10182026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10192026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /v2p sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10202026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = DELETE path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10212026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 11.0.0
10222026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 10.0.0 to 11.0.0
10232026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 9.0.0 to 10.0.0
10242026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = from 7.0.0 to 9.0.0
10252026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vmms/{propolis_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 7.0.0
10262026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /vmms/{propolis_id}/disks/{disk_id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10272026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = DELETE path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10282026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vmms/{propolis_id}/external-ip sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10292026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = DELETE path = /vmms/{propolis_id}/multicast-group sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 7.0.0
10302026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vmms/{propolis_id}/multicast-group sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 7.0.0
10312026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /vmms/{propolis_id}/poke sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10322026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /vmms/{propolis_id}/poke-single-step sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10332026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /vmms/{propolis_id}/sim-migration-source sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10342026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10352026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vmms/{propolis_id}/state sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10362026-01-14T21:22:38.825ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all starting from 10.0.0
10372026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vpc/{vpc_id}/firewall/rules sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all ending with 10.0.0
10382026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10392026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /vpc-routes sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10402026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /zones sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10412026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = POST path = /zones/bundle-cleanup sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10422026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10432026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = PUT path = /zones/bundle-cleanup/context sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10442026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /zones/bundle-cleanup/utilization sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10452026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /zones/bundles sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10462026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /zones/bundles/{zone_name} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10472026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = DELETE path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10482026-01-14T21:22:38.826ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:60096 method = GET path = /zones/bundles/{zone_name}/{bundle_id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
10492026-01-14T21:22:38.826ZINFOtest_vpc_firewall (dropshot): listening local_addr = [::1]:60096 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10502026-01-14T21:22:38.831ZDEBGtest_vpc_firewall (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:60096 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10512026-01-14T21:22:38.833ZDEBGtest_vpc_firewall (omicron_sled_agent::sim::Server): contacting server nexus sled_id = b6d65341-167c-41df-9b5c-41cded99c229
10522026-01-14T21:22:38.833ZDEBGtest_vpc_firewall (NexusClient): client request body = Some(Body) method = POST sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = http://127.0.0.1:45286/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
10532026-01-14T21:22:38.844ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database
10542026-01-14T21:22:38.844ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_replacement roles = RoleSet { roles: {} }
10552026-01-14T21:22:38.846ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement resource = Database result = Ok(())
10562026-01-14T21:22:38.854ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database
10572026-01-14T21:22:38.854ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_replacement_driver roles = RoleSet { roles: {} }
10582026-01-14T21:22:38.855ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_replacement_driver resource = Database result = Ok(())
10592026-01-14T21:22:38.860ZINFOtest_vpc_firewall (dropshot_internal): accepted connection local_addr = 127.0.0.1:45286 remote_addr = 127.0.0.1:54711
10602026-01-14T21:22:38.860ZINFOtest_vpc_firewall (dropshot_internal): accepted connection local_addr = 127.0.0.1:45286 remote_addr = 127.0.0.1:63833
10612026-01-14T21:22:38.863ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:54711 req_id = 9dfddb8c-db08-44ce-ad3d-fad3dd2da271 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
10622026-01-14T21:22:38.863ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:54711 req_id = 9dfddb8c-db08-44ce-ad3d-fad3dd2da271 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229 version = 1.0.0
10632026-01-14T21:22:38.864ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:63833 req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53 uri = /nat/ipv4/changeset/0?limit=100
10642026-01-14T21:22:38.864ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:63833 req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53 uri = /nat/ipv4/changeset/0?limit=100 version = 1.0.0
10652026-01-14T21:22:38.887ZINFOtest_vpc_firewall (nexus): registered sled agent sled_uuid = b6d65341-167c-41df-9b5c-41cded99c229
10662026-01-14T21:22:38.897ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:63833 req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53 resource = Database type = user_builtin uri = /nat/ipv4/changeset/0?limit=100 user_builtin_id = 001de000-05e4-4000-8000-000000000002
10672026-01-14T21:22:38.903ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:63833 req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53 roles = RoleSet { roles: {} } type = user_builtin uri = /nat/ipv4/changeset/0?limit=100 user_builtin_id = 001de000-05e4-4000-8000-000000000002
10682026-01-14T21:22:38.904ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:63833 req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53 resource = Database result = Ok(()) type = user_builtin uri = /nat/ipv4/changeset/0?limit=100 user_builtin_id = 001de000-05e4-4000-8000-000000000002
10692026-01-14T21:22:38.921ZINFOtest_vpc_firewall (SagaRecoverer): listed in-progress sagas count = 0
10702026-01-14T21:22:38.921ZINFOtest_vpc_firewall (SagaQuiesceHandle): saga recovery pass finished blueprint_id = None generation = 1
10712026-01-14T21:22:38.921ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = saga_recovery elapsed = 1.224953104s iteration = 1 status = {"last_pass":{"Success":{"nfailed":0,"nfound":0,"nrecovered":0,"nremoved":0,"nskipped":0}},"ntotal_failures":0,"ntotal_finished":0,"ntotal_recovered":0,"ntotal_sec_errors_bad_state":0,"ntotal_sec_errors_missing":0,"ntotal_started":0,"recent_failures":[],"recent_recoveries":[]}
10722026-01-14T21:22:38.922ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database
10732026-01-14T21:22:38.922ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_snapshot_replacement_start roles = RoleSet { roles: {} }
10742026-01-14T21:22:38.923ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_start resource = Database result = Ok(())
10752026-01-14T21:22:38.925ZDEBGtest_vpc_firewall (BackgroundTasks): Found abandoned VMMs background_task = abandoned_vmm_reaper count = 0 total = 0
10762026-01-14T21:22:38.925ZINFOtest_vpc_firewall (BackgroundTasks): Abandoned VMMs reaped background_task = abandoned_vmm_reaper sled_reservations_deleted = 0 vmms_already_deleted = 0 vmms_deleted = 0 vmms_found = 0
10772026-01-14T21:22:38.925ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = abandoned_vmm_reaper elapsed = 1.231017416s iteration = 1 status = {"errors":[],"sled_reservations_deleted":0,"vmms_already_deleted":0,"vmms_deleted":0,"vmms_found":0}
10782026-01-14T21:22:38.926ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = region_snapshot_replacement_garbage_collection elapsed = 1.064349532s iteration = 1 status = {"errors":[],"garbage_collect_requested":[]}
10792026-01-14T21:22:38.926ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database
10802026-01-14T21:22:38.926ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
10812026-01-14T21:22:38.927ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
10822026-01-14T21:22:38.932ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
10832026-01-14T21:22:38.932ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
10842026-01-14T21:22:38.934ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
10852026-01-14T21:22:39.022ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10862026-01-14T21:22:39.031ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet result = Ok(())
10872026-01-14T21:22:39.032ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet
10882026-01-14T21:22:39.034ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = probe_distributor resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
10892026-01-14T21:22:39.035ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database
10902026-01-14T21:22:39.035ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
10912026-01-14T21:22:39.036ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
10922026-01-14T21:22:39.038ZINFOtest_vpc_firewall (BackgroundTasks): all webhook delivery tasks completed background_task = webhook_deliverator num_receivers = 0
10932026-01-14T21:22:39.039ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = webhook_deliverator elapsed = 1.162744013s iteration = 1 status = {"by_rx":{},"error":null}
10942026-01-14T21:22:39.044ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10952026-01-14T21:22:39.073ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
10962026-01-14T21:22:39.099ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = read_only_region_replacement_start elapsed = 1.230771343s iteration = 1 status = {"errors":[],"requests_created_ok":[]}
10972026-01-14T21:22:39.162ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = region_snapshot_replacement_finish elapsed = 1.296338842s iteration = 1 status = {"errors":[],"finish_invoked_ok":[]}
10982026-01-14T21:22:39.186ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
10992026-01-14T21:22:39.191ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
11002026-01-14T21:22:39.191ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
11012026-01-14T21:22:39.191ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
11022026-01-14T21:22:39.192ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
11032026-01-14T21:22:39.193ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig
11042026-01-14T21:22:39.194ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11052026-01-14T21:22:39.194ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
11062026-01-14T21:22:39.194ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
11072026-01-14T21:22:39.194ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
11082026-01-14T21:22:39.229ZDEBGtest_vpc_firewall (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
11092026-01-14T21:22:39.229ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
11102026-01-14T21:22:39.230ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 50 4b 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 PK..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:44545 req_id = 5b9a70a2-3591-4377-918b-315e2cde0eda
11112026-01-14T21:22:39.230ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 20555,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:44545 req_id = 5b9a70a2-3591-4377-918b-315e2cde0eda
11122026-01-14T21:22:39.230ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 20555, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_mgs._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 4, 95, 109, 103, 115, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } SERVFAIL: server is not authoritative for name: "_mgs._tcp.control-plane.oxide.internal." kind = dns peer_addr = [::1]:44545 req_id = 5b9a70a2-3591-4377-918b-315e2cde0eda
11132026-01-14T21:22:39.255ZWARNtest_vpc_firewall (BackgroundTasks): inventory collection failed background_task = inventory_collection error = failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }
11142026-01-14T21:22:39.255ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 1.64084051s iteration = 1 status = {"error":"failed to collect inventory: looking up MGS addresses: proto error: no records found for Query { name: Name(\\"_mgs._tcp.control-plane.oxide.internal.\\"), query_type: SRV, query_class: IN }"}
11152026-01-14T21:22:39.256ZTRACtest_vpc_firewall (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = instance failed total_found = 0
11162026-01-14T21:22:39.256ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database
11172026-01-14T21:22:39.256ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = instance_reincarnation roles = RoleSet { roles: {} }
11182026-01-14T21:22:39.257ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = instance_reincarnation resource = Database result = Ok(())
11192026-01-14T21:22:39.258ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = inventory_loader elapsed = 1.639590751s iteration = 1 status = "NoCollections"
11202026-01-14T21:22:39.259ZWARNtest_vpc_firewall (BackgroundTasks): failed to read target blueprint background_task = blueprint_loader error = Internal Error: no target blueprint set
11212026-01-14T21:22:39.259ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 1.637821009s iteration = 1 status = {"error":"failed to read target blueprint: Internal Error: no target blueprint set"}
11222026-01-14T21:22:39.260ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11232026-01-14T21:22:39.265ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
11242026-01-14T21:22:39.265ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
11252026-01-14T21:22:39.265ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11262026-01-14T21:22:39.265ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
11272026-01-14T21:22:39.265ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
11282026-01-14T21:22:39.266ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
11292026-01-14T21:22:39.293ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11302026-01-14T21:22:39.301ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
11312026-01-14T21:22:39.303ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11322026-01-14T21:22:39.310ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet result = Ok(())
11332026-01-14T21:22:39.310ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database
11342026-01-14T21:22:39.311ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
11352026-01-14T21:22:39.311ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
11362026-01-14T21:22:39.314ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11372026-01-14T21:22:39.318ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
11382026-01-14T21:22:39.320ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = switch_port_config_manager elapsed = 1.638704527s iteration = 1 status = {}
11392026-01-14T21:22:39.321ZDEBGtest_vpc_firewall (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-14T21:22:37.508570Z })
11402026-01-14T21:22:39.321ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 1.642030681s iteration = 1 status = {"config_updated":true}
11412026-01-14T21:22:39.321ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_planner iteration = 2 reason = Dependency
11422026-01-14T21:22:39.321ZDEBGtest_vpc_firewall (BackgroundTasks): blueprint planning disabled, doing nothing background_task = blueprint_planner
11432026-01-14T21:22:39.321ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 36.302\u{b5}s iteration = 2 status = "Disabled"
11442026-01-14T21:22:39.321ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = tuf_repo_pruner iteration = 2 reason = Dependency
11452026-01-14T21:22:39.321ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet
11462026-01-14T21:22:39.321ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_repo_pruner resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11472026-01-14T21:22:39.321ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
11482026-01-14T21:22:39.321ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
11492026-01-14T21:22:39.322ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
11502026-01-14T21:22:39.328ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
11512026-01-14T21:22:39.328ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
11522026-01-14T21:22:39.329ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
11532026-01-14T21:22:39.341ZWARNtest_vpc_firewall (BackgroundTasks): failed to read DNS config background_task = dns_config_internal dns_group = internal error = Internal Error: expected exactly one latest version for DNS group Internal, found 0
11542026-01-14T21:22:39.341ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 1.697985648s iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group Internal, found 0"}
11552026-01-14T21:22:39.387ZINFOtest_vpc_firewall (BackgroundTasks): all instance checks complete background_task = instance_watcher pruned_instances = 0 total_completed = 0 total_failed = 0 total_incomplete = 0 total_instances = 0 update_sagas_queued = 0
11562026-01-14T21:22:39.387ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = instance_watcher elapsed = 1.697924558s iteration = 1 status = {"failed_checks":{},"incomplete_checks":{},"instance_states":{},"pruned_instances":0,"total_instances":0,"update_sagas_queued":0}
11572026-01-14T21:22:39.388ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet
11582026-01-14T21:22:39.388ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = support_bundle_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
11592026-01-14T21:22:39.388ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database
11602026-01-14T21:22:39.388ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
11612026-01-14T21:22:39.389ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
11622026-01-14T21:22:39.390ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
11632026-01-14T21:22:39.391ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
11642026-01-14T21:22:39.391ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
11652026-01-14T21:22:39.441ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11662026-01-14T21:22:39.450ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet result = Ok(())
11672026-01-14T21:22:39.451ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database
11682026-01-14T21:22:39.451ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
11692026-01-14T21:22:39.452ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
11702026-01-14T21:22:39.483ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11712026-01-14T21:22:39.489ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
11722026-01-14T21:22:39.490ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
11732026-01-14T21:22:39.490ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
11742026-01-14T21:22:39.490ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
11752026-01-14T21:22:39.515ZTRACtest_vpc_firewall (BackgroundTasks): reprocessing 0 outdated webhook globs... background_task = alert_dispatcher
11762026-01-14T21:22:39.516ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database
11772026-01-14T21:22:39.516ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = alert_dispatcher roles = RoleSet { roles: {} }
11782026-01-14T21:22:39.517ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = alert_dispatcher resource = Database result = Ok(())
11792026-01-14T21:22:39.519ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = region_replacement elapsed = 1.832553983s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
11802026-01-14T21:22:39.527ZWARNtest_vpc_firewall (BackgroundTasks): failed to read DNS config background_task = dns_config_external dns_group = external error = Internal Error: expected exactly one latest version for DNS group External, found 0
11812026-01-14T21:22:39.527ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 1.87876659s iteration = 1 status = {"error":"failed to read DNS config: Internal Error: expected exactly one latest version for DNS group External, found 0"}
11822026-01-14T21:22:39.527ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = fm_sitrep_loader elapsed = 1.643209482s iteration = 1 status = "NoSitrep"
11832026-01-14T21:22:39.649ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 785714 local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:63833 req_id = 32c6f15a-0ee7-48ce-b096-9407e2edea53 response_code = 200 uri = /nat/ipv4/changeset/0?limit=100
11842026-01-14T21:22:39.722ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = region_replacement_driver elapsed = 2.03452555s iteration = 1 status = {"drive_invoked_ok":[],"errors":[],"finish_invoked_ok":[]}
11852026-01-14T21:22:39.742ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database
11862026-01-14T21:22:39.752ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = region_snapshot_replacement_step roles = RoleSet { roles: {} }
11872026-01-14T21:22:39.754ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = region_snapshot_replacement_step resource = Database result = Ok(())
11882026-01-14T21:22:39.758ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11892026-01-14T21:22:39.763ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Fleet result = Ok(())
11902026-01-14T21:22:39.764ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database
11912026-01-14T21:22:39.764ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = support_bundle_collector roles = RoleSet { roles: {} }
11922026-01-14T21:22:39.764ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = support_bundle_collector resource = Database result = Ok(())
11932026-01-14T21:22:39.766ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
11942026-01-14T21:22:39.771ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet result = Ok(())
11952026-01-14T21:22:39.771ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
11962026-01-14T21:22:39.771ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
11972026-01-14T21:22:39.771ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
11982026-01-14T21:22:39.774ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = region_snapshot_replacement_start elapsed = 1.91506952s iteration = 1 status = {"errors":[],"requests_completed_ok":[],"requests_created_ok":[],"start_invoked_ok":[]}
11992026-01-14T21:22:39.779ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet
12002026-01-14T21:22:39.779ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_gc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12012026-01-14T21:22:39.779ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
12022026-01-14T21:22:39.779ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
12032026-01-14T21:22:39.780ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
12042026-01-14T21:22:39.784ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
12052026-01-14T21:22:39.784ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12062026-01-14T21:22:39.784ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12072026-01-14T21:22:39.784ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12082026-01-14T21:22:39.785ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12092026-01-14T21:22:39.814ZTRACtest_vpc_firewall (BackgroundTasks): webhook dispatching completed successfully background_task = alert_dispatcher events_dispatched = 0 events_without_receivers = 0
12102026-01-14T21:22:39.814ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = alert_dispatcher elapsed = 1.944346724s iteration = 1 status = {"dispatched":[],"errors":[],"glob_version":"215.0.0","globs_reprocessed":{},"no_receivers":[]}
12112026-01-14T21:22:39.895ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
12122026-01-14T21:22:39.895ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12132026-01-14T21:22:39.895ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12142026-01-14T21:22:39.896ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12152026-01-14T21:22:39.909ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet
12162026-01-14T21:22:39.910ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_repo_pruner resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12172026-01-14T21:22:39.910ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
12182026-01-14T21:22:39.910ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
12192026-01-14T21:22:39.911ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
12202026-01-14T21:22:39.918ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12212026-01-14T21:22:39.922ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
12222026-01-14T21:22:39.931ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12232026-01-14T21:22:39.931ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12242026-01-14T21:22:39.932ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12252026-01-14T21:22:39.933ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12262026-01-14T21:22:40.037ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = region_snapshot_replacement_step elapsed = 2.173837068s iteration = 1 status = {"errors":[],"step_garbage_collect_invoked_ok":[],"step_invoked_ok":[],"step_records_created_ok":[],"step_set_volume_deleted_ok":[]}
12272026-01-14T21:22:40.043ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12282026-01-14T21:22:40.055ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
12292026-01-14T21:22:40.055ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
12302026-01-14T21:22:40.055ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
12312026-01-14T21:22:40.055ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
12322026-01-14T21:22:40.142ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = inventory_collection iteration = 2 reason = Signaled
12332026-01-14T21:22:40.142ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
12342026-01-14T21:22:40.143ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12352026-01-14T21:22:40.143ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
12362026-01-14T21:22:40.143ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
12372026-01-14T21:22:40.144ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
12382026-01-14T21:22:40.145ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 1282366 local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:54711 req_id = 9dfddb8c-db08-44ce-ad3d-fad3dd2da271 response_code = 204 uri = /sled-agents/b6d65341-167c-41df-9b5c-41cded99c229
12392026-01-14T21:22:40.146ZINFOtest_vpc_firewall (BackgroundTasks): No bundles to collect background_task = support_bundle_collector
12402026-01-14T21:22:40.146ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = support_bundle_collector elapsed = 2.515459851s iteration = 1 status = {"cleanup_err":null,"cleanup_report":{"db_destroying_bundles_removed":0,"db_failing_bundles_updated":0,"sled_bundles_delete_failed":0,"sled_bundles_deleted_not_found":0,"sled_bundles_deleted_ok":0},"collection_err":null,"collection_report":null}
12412026-01-14T21:22:40.147ZDEBGtest_vpc_firewall (NexusClient): client response result = Ok(Response { url: "http://127.0.0.1:45286/sled-agents/b6d65341-167c-41df-9b5c-41cded99c229", status: 204, headers: {"x-request-id": "9dfddb8c-db08-44ce-ad3d-fad3dd2da271", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} }) sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12422026-01-14T21:22:40.147ZDEBGtest_vpc_firewall (init_with_steps): Running step configure_boundary_ntp
12432026-01-14T21:22:40.148ZDEBGtest_vpc_firewall (init_with_steps): Running step start_crucible_pantry
12442026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = GET path = /crucible/pantry/0 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12452026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = GET path = /crucible/pantry/0/job/{id}/is-finished sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12462026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = GET path = /crucible/pantry/0/job/{id}/ok sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12472026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = DELETE path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12482026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = GET path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12492026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = POST path = /crucible/pantry/0/volume/{id} sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12502026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = POST path = /crucible/pantry/0/volume/{id}/background sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12512026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = POST path = /crucible/pantry/0/volume/{id}/bulk-write sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12522026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = POST path = /crucible/pantry/0/volume/{id}/import-from-url sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12532026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = POST path = /crucible/pantry/0/volume/{id}/scrub sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12542026-01-14T21:22:40.150ZDEBGtest_vpc_firewall (dropshot): registered endpoint kind = pantry local_addr = [::1]:60375 method = POST path = /crucible/pantry/0/volume/{id}/snapshot sled_id = b6d65341-167c-41df-9b5c-41cded99c229 versions = all
12552026-01-14T21:22:40.150ZINFOtest_vpc_firewall (dropshot): listening kind = pantry local_addr = [::1]:60375 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12562026-01-14T21:22:40.151ZDEBGtest_vpc_firewall (dropshot): successfully registered DTrace USDT probes kind = pantry local_addr = [::1]:60375 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12572026-01-14T21:22:40.151ZINFOtest_vpc_firewall (omicron_sled_agent::sim::Server): Started Simulated Crucible Pantry address = [::1]:60375 kind = pantry sled_id = b6d65341-167c-41df-9b5c-41cded99c229
12582026-01-14T21:22:40.151ZDEBGtest_vpc_firewall (init_with_steps): Running step populate_internal_dns
12592026-01-14T21:22:40.152ZDEBGtest_vpc_firewall: Populating Internal DNS
12602026-01-14T21:22:40.242ZINFOtest_vpc_firewall: DNS population: DnsConfigParams { generation: Generation( 1, ), serial: 1, time_created: 2026-01-14T21:22:40.241223935Z, zones: [ DnsConfigZone { zone_name: "control-plane.oxide.internal", records: { "4ca13454-dc8a-4ce2-981d-d389027c56d3.host": [ Aaaa( ::1, ), ], "_nexus._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 45286, target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal", }, ), ], "_boundary-ntp._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 123, target: "541d5209-e75f-4f24-a362-01ff39fdfcab.host.control-plane.oxide.internal", }, ), ], "b6d65341-167c-41df-9b5c-41cded99c229.sled": [ Aaaa( ::1, ), ], "_mgd._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 39674, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "boundary-ntp": [ Aaaa( ::1, ), ], "_repo-depot._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 52160, target: "b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal", }, ), ], "3336d418-9683-4f43-b194-7d4037731737.host": [ Aaaa( ::1, ), ], "_clickhouse-native._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 9000, target: "3336d418-9683-4f43-b194-7d4037731737.host.control-plane.oxide.internal", }, ), ], "077622b5-37ad-4801-a59d-22b17b3a7e04.host": [ Aaaa( ::1, ), ], "_cockroach._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 46432, target: "4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal", }, ), ], "6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host": [ Aaaa( ::1, ), ], "_external-dns._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 41277, target: "6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal", }, ), ], "_oximeter-reader._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 9000, target: "3336d418-9683-4f43-b194-7d4037731737.host.control-plane.oxide.internal", }, ), ], "@": [ Ns( "ns1.control-plane.oxide.internal", ), ], "_clickhouse._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 64361, target: "3336d418-9683-4f43-b194-7d4037731737.host.control-plane.oxide.internal", }, ), ], "_dendrite._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 65194, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], "ns1": [ Aaaa( ::1, ), ], "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host": [ Aaaa( ::1, ), ], "_nexus-lockstep._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 36202, target: "913233fe-92a8-4635-9572-183f495429c4.host.control-plane.oxide.internal", }, ), ], "_crucible-pantry._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 60375, target: "077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal", }, ), ], "541d5209-e75f-4f24-a362-01ff39fdfcab.host": [ Aaaa( ::1, ), ], "0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host": [ Aaaa( ::1, ), ], "913233fe-92a8-4635-9572-183f495429c4.host": [ Aaaa( ::ffff:127.0.0.1, ), ], "_clickhouse-admin-single-server._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 8888, target: "3336d418-9683-4f43-b194-7d4037731737.host.control-plane.oxide.internal", }, ), ], "_nameservice._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 43592, target: "0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal", }, ), ], "_mgs._tcp": [ Srv( Srv { prio: 0, weight: 0, port: 59250, target: "dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal", }, ), ], }, }, ], }
12612026-01-14T21:22:40.262ZDEBGtest_vpc_firewall: client request body = Some(Body) method = PUT uri = http://[::1]:43592/config
12622026-01-14T21:22:40.407ZINFOtest_vpc_firewall (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
12632026-01-14T21:22:40.407ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:60096/vpc-routes
12642026-01-14T21:22:40.407ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12652026-01-14T21:22:40.417ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
12662026-01-14T21:22:40.418ZTRACtest_vpc_firewall (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
12672026-01-14T21:22:40.418ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
12682026-01-14T21:22:40.418ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
12692026-01-14T21:22:40.418ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
12702026-01-14T21:22:40.418ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
12712026-01-14T21:22:40.418ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
12722026-01-14T21:22:40.420ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet
12732026-01-14T21:22:40.420ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = probe_distributor resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12742026-01-14T21:22:40.420ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database
12752026-01-14T21:22:40.420ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
12762026-01-14T21:22:40.420ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
12772026-01-14T21:22:40.422ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet
12782026-01-14T21:22:40.422ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12792026-01-14T21:22:40.423ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
12802026-01-14T21:22:40.423ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
12812026-01-14T21:22:40.423ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
12822026-01-14T21:22:40.424ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12832026-01-14T21:22:40.429ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
12842026-01-14T21:22:40.429ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
12852026-01-14T21:22:40.429ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
12862026-01-14T21:22:40.429ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
12872026-01-14T21:22:40.511ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
12882026-01-14T21:22:40.511ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
12892026-01-14T21:22:40.511ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
12902026-01-14T21:22:40.511ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
12912026-01-14T21:22:40.512ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
12922026-01-14T21:22:40.514ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
12932026-01-14T21:22:40.520ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Fleet result = Ok(())
12942026-01-14T21:22:40.520ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
12952026-01-14T21:22:40.520ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
12962026-01-14T21:22:40.520ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
12972026-01-14T21:22:40.522ZWARNtest_vpc_firewall (BackgroundTasks): failed to read Silo/DNS/TLS configuration background_task = external_endpoints error = Internal Error: expected at least one external DNS zone
12982026-01-14T21:22:40.523ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 2.855929014s iteration = 1 status = {"error":"failed to read Silo/DNS/TLS configuration: Internal Error: expected at least one external DNS zone"}
12992026-01-14T21:22:40.524ZTRACtest_vpc_firewall (BackgroundTasks): no more instances in need of reincarnation background_task = instance_reincarnation reincarnation_reason = start saga failed total_found = 0
13002026-01-14T21:22:40.525ZINFOtest_vpc_firewall (BackgroundTasks): instance reincarnation completed successfully background_task = instance_reincarnation instances_changed_state = 0 instances_found = 0 instances_reincarnated = 0
13012026-01-14T21:22:40.526ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = instance_reincarnation elapsed = 2.834137177s iteration = 1 status = {"changed_state":[],"disabled":false,"errors":[],"instances_found":{"Failed":0,"SagaUnwound":0},"instances_reincarnated":[],"restart_errors":[]}
13022026-01-14T21:22:40.527ZINFOtest_vpc_firewall (http): accepted connection kind = dns local_addr = [::1]:43592 remote_addr = [::1]:62653
13032026-01-14T21:22:40.531ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:51058 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13042026-01-14T21:22:40.533ZDEBGtest_vpc_firewall (BackgroundTasks): deleted 0 of 0 sitreps sitreps background_task = fm_sitrep_gc case_ereports_deleted = 0 cases_deleted = 0 ids = [] sitreps_deleted = 0
13052026-01-14T21:22:40.533ZTRACtest_vpc_firewall (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted background_task = fm_sitrep_gc
13062026-01-14T21:22:40.533ZINFOtest_vpc_firewall (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0 background_task = fm_sitrep_gc
13072026-01-14T21:22:40.533ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = fm_sitrep_gc elapsed = 2.893015485s iteration = 1 status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
13082026-01-14T21:22:40.536ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = GET remote_addr = [::1]:51058 req_id = a2876190-b227-4621-8a9b-84bb0db2da71 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
13092026-01-14T21:22:40.536ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = GET remote_addr = [::1]:51058 req_id = a2876190-b227-4621-8a9b-84bb0db2da71 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes version = 12.0.0
13102026-01-14T21:22:40.537ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 904 local_addr = [::1]:60096 method = GET remote_addr = [::1]:51058 req_id = a2876190-b227-4621-8a9b-84bb0db2da71 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
13112026-01-14T21:22:40.538ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13122026-01-14T21:22:40.546ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Fleet result = Ok(())
13132026-01-14T21:22:40.546ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database
13142026-01-14T21:22:40.547ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = probe_distributor roles = RoleSet { roles: {} }
13152026-01-14T21:22:40.547ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = probe_distributor resource = Database result = Ok(())
13162026-01-14T21:22:40.549ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
13172026-01-14T21:22:40.549ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
13182026-01-14T21:22:40.549ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13192026-01-14T21:22:40.550ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13202026-01-14T21:22:40.552ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13212026-01-14T21:22:40.561ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet result = Ok(())
13222026-01-14T21:22:40.561ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet
13232026-01-14T21:22:40.561ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = v2p_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13242026-01-14T21:22:40.561ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
13252026-01-14T21:22:40.561ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
13262026-01-14T21:22:40.562ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
13272026-01-14T21:22:40.564ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13282026-01-14T21:22:40.570ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
13292026-01-14T21:22:40.570ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
13302026-01-14T21:22:40.570ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
13312026-01-14T21:22:40.571ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
13322026-01-14T21:22:40.572ZDEBGtest_vpc_firewall (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = []
13332026-01-14T21:22:40.572ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
13342026-01-14T21:22:40.574ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = TargetReleaseConfig
13352026-01-14T21:22:40.574ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_repo_pruner resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13362026-01-14T21:22:40.574ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
13372026-01-14T21:22:40.574ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
13382026-01-14T21:22:40.575ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
13392026-01-14T21:22:40.578ZTRACtest_vpc_firewall (http): incoming request kind = dns local_addr = [::1]:43592 method = PUT remote_addr = [::1]:62653 req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3 uri = /config
13402026-01-14T21:22:40.578ZDEBGtest_vpc_firewall (http): determined request API version kind = dns local_addr = [::1]:43592 method = PUT remote_addr = [::1]:62653 req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3 uri = /config version = 2.0.0
13412026-01-14T21:22:40.579ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:60096/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "a2876190-b227-4621-8a9b-84bb0db2da71", "content-length": "2", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
13422026-01-14T21:22:40.579ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
13432026-01-14T21:22:40.579ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
13442026-01-14T21:22:40.580ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
13452026-01-14T21:22:40.582ZINFOtest_vpc_firewall (store): attempting generation update new_generation = 1 req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3
13462026-01-14T21:22:40.582ZINFOtest_vpc_firewall (store): pruning trees for generations newer than 0
13472026-01-14T21:22:40.582ZDEBGtest_vpc_firewall (store): creating tree tree_name = generation_1_zone_control-plane.oxide.internal
13482026-01-14T21:22:40.584ZDEBGtest_vpc_firewall (store): updating current config
13492026-01-14T21:22:40.584ZDEBGtest_vpc_firewall (store): flushing default tree
13502026-01-14T21:22:40.584ZINFOtest_vpc_firewall (store): pruning trees for generations older than 1 keep = 3
13512026-01-14T21:22:40.584ZINFOtest_vpc_firewall (store): updated generation new_generation = 1 req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3
13522026-01-14T21:22:40.586ZINFOtest_vpc_firewall (http): request completed kind = dns latency_us = 7520 local_addr = [::1]:43592 method = PUT remote_addr = [::1]:62653 req_id = bc84fa0a-d846-4b11-bc06-97e04e1a78a3 response_code = 204 uri = /config
13532026-01-14T21:22:40.586ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13542026-01-14T21:22:40.595ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Fleet result = Ok(())
13552026-01-14T21:22:40.595ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database
13562026-01-14T21:22:40.595ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = v2p_manager roles = RoleSet { roles: {} }
13572026-01-14T21:22:40.595ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = v2p_manager resource = Database result = Ok(())
13582026-01-14T21:22:40.597ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13592026-01-14T21:22:40.597ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
13602026-01-14T21:22:40.597ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13612026-01-14T21:22:40.598ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13622026-01-14T21:22:40.599ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
13632026-01-14T21:22:40.599ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
13642026-01-14T21:22:40.599ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
13652026-01-14T21:22:40.599ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
13662026-01-14T21:22:40.600ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
13672026-01-14T21:22:40.602ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13682026-01-14T21:22:40.611ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = TargetReleaseConfig result = Ok(())
13692026-01-14T21:22:40.611ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database
13702026-01-14T21:22:40.612ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_repo_pruner roles = RoleSet { roles: {} }
13712026-01-14T21:22:40.612ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_repo_pruner resource = Database result = Ok(())
13722026-01-14T21:22:40.676ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = probe_distributor body = Some(Body) method = PUT uri = http://[::1]:60096/probes
13732026-01-14T21:22:40.678ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:43969 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
13742026-01-14T21:22:40.678ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 7b 42 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 {B..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:58602 req_id = 1773b24c-1e2c-4f26-8d45-0aabb9e5ac39
13752026-01-14T21:22:40.678ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 31554,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:58602 req_id = 1773b24c-1e2c-4f26-8d45-0aabb9e5ac39
13762026-01-14T21:22:40.678ZDEBGtest_vpc_firewall (store): query key key = _mgs._tcp
13772026-01-14T21:22:40.679ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
13782026-01-14T21:22:40.679ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:58602 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 1773b24c-1e2c-4f26-8d45-0aabb9e5ac39
13792026-01-14T21:22:40.679ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13802026-01-14T21:22:40.692ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
13812026-01-14T21:22:40.693ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
13822026-01-14T21:22:40.693ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
13832026-01-14T21:22:40.693ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
13842026-01-14T21:22:40.696ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
13852026-01-14T21:22:40.703ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
13862026-01-14T21:22:40.703ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
13872026-01-14T21:22:40.704ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
13882026-01-14T21:22:40.705ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
13892026-01-14T21:22:40.707ZINFOtest_vpc_firewall (BackgroundTasks): tuf_repo_prune decision background_task = tuf_repo_pruner status = TufRepoPrunerDetails { nkeep_recent_releases: 3, nkeep_recent_uploads: 2, repos_keep_target_release: {}, repos_keep_recent_uploads: {}, repo_prune: None, other_repos_eligible_to_prune: {}, warnings: [] }
13902026-01-14T21:22:40.707ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = tuf_repo_pruner elapsed = 1.386482777s iteration = 2 status = {"nkeep_recent_releases":3,"nkeep_recent_uploads":2,"other_repos_eligible_to_prune":[],"repo_prune":null,"repos_keep_recent_uploads":[],"repos_keep_target_release":[],"status":"enabled","warnings":[]}
13912026-01-14T21:22:40.708ZDEBGtest_vpc_firewall: client response result = Ok(Response { url: "http://[::1]:43592/config", status: 204, headers: {"x-request-id": "bc84fa0a-d846-4b11-bc06-97e04e1a78a3", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
13922026-01-14T21:22:40.710ZDEBGtest_vpc_firewall (init_with_steps): Running step configure_sled_agents
13932026-01-14T21:22:40.784ZDEBGtest_vpc_firewall: client request body = Some(Body) method = PUT uri = http://[::1]:60096/omicron-config
13942026-01-14T21:22:40.785ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10484, tv_nsec: 172483797 } })
13952026-01-14T21:22:40.785ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
13962026-01-14T21:22:40.787ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = PUT remote_addr = [::1]:43969 req_id = 3db35ec9-0209-45d2-b60c-23410d73a396 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /probes
13972026-01-14T21:22:40.787ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = PUT remote_addr = [::1]:43969 req_id = 3db35ec9-0209-45d2-b60c-23410d73a396 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /probes version = 12.0.0
13982026-01-14T21:22:40.788ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1543 local_addr = [::1]:60096 method = PUT remote_addr = [::1]:43969 req_id = 3db35ec9-0209-45d2-b60c-23410d73a396 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /probes
13992026-01-14T21:22:40.789ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14002026-01-14T21:22:40.789ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14012026-01-14T21:22:40.790ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14022026-01-14T21:22:40.792ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:63174 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14032026-01-14T21:22:40.793ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = probe_distributor result = Ok(Response { url: "http://[::1]:60096/probes", status: 204, headers: {"x-request-id": "3db35ec9-0209-45d2-b60c-23410d73a396", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
14042026-01-14T21:22:40.793ZDEBGtest_vpc_firewall (BackgroundTasks): Update set of probes on sled background_task = probe_distributor n_probes = 0 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14052026-01-14T21:22:40.797ZINFOtest_vpc_firewall (BackgroundTasks): finished distributing probes to sleds background_task = probe_distributor n_pushed_probes = 0
14062026-01-14T21:22:40.797ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = probe_distributor elapsed = 2.895275151s iteration = 1 status = {"errors":[],"probes_by_sled":{"b6d65341-167c-41df-9b5c-41cded99c229":0}}
14072026-01-14T21:22:40.800ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 72 33 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e r3..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:30469 req_id = df2fdf94-e7c2-4335-92e8-55e091fabbd3
14082026-01-14T21:22:40.800ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 29235,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:30469 req_id = df2fdf94-e7c2-4335-92e8-55e091fabbd3
14092026-01-14T21:22:40.801ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
14102026-01-14T21:22:40.801ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:30469 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = df2fdf94-e7c2-4335-92e8-55e091fabbd3
14112026-01-14T21:22:40.873ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
14122026-01-14T21:22:40.875ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = PUT remote_addr = [::1]:63174 req_id = 78efcf8c-eb36-478b-81b7-5b7d33f064c7 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-config
14132026-01-14T21:22:40.875ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = PUT remote_addr = [::1]:63174 req_id = 78efcf8c-eb36-478b-81b7-5b7d33f064c7 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-config version = 12.0.0
14142026-01-14T21:22:40.887ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 12054 local_addr = [::1]:60096 method = PUT remote_addr = [::1]:63174 req_id = 78efcf8c-eb36-478b-81b7-5b7d33f064c7 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /omicron-config
14152026-01-14T21:22:40.887ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet
14162026-01-14T21:22:40.887ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = tuf_artifact_replication resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14172026-01-14T21:22:40.887ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
14182026-01-14T21:22:40.887ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
14192026-01-14T21:22:40.889ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
14202026-01-14T21:22:40.980ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager body = None method = GET uri = http://[::1]:60096/v2p
14212026-01-14T21:22:40.981ZINFOtest_vpc_firewall (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = SimGimlet00
14222026-01-14T21:22:40.981ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:60096/eip-gateways
14232026-01-14T21:22:40.982ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14242026-01-14T21:22:40.983ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14252026-01-14T21:22:40.984ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14262026-01-14T21:22:40.988ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:51682 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14272026-01-14T21:22:40.989ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = PUT remote_addr = [::1]:51058 req_id = 7db12026-7f3a-42b2-9161-06a5158f9e8e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
14282026-01-14T21:22:40.989ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = PUT remote_addr = [::1]:51058 req_id = 7db12026-7f3a-42b2-9161-06a5158f9e8e sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways version = 12.0.0
14292026-01-14T21:22:40.990ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 912 local_addr = [::1]:60096 method = PUT remote_addr = [::1]:51058 req_id = 7db12026-7f3a-42b2-9161-06a5158f9e8e response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
14302026-01-14T21:22:40.990ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14312026-01-14T21:22:40.998ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Fleet result = Ok(())
14322026-01-14T21:22:40.998ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database
14332026-01-14T21:22:40.998ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = tuf_artifact_replication roles = RoleSet { roles: {} }
14342026-01-14T21:22:40.999ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = tuf_artifact_replication resource = Database result = Ok(())
14352026-01-14T21:22:41.001ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14362026-01-14T21:22:41.001ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14372026-01-14T21:22:41.001ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14382026-01-14T21:22:41.003ZDEBGtest_vpc_firewall: client response result = Ok(Response { url: "http://[::1]:60096/omicron-config", status: 204, headers: {"x-request-id": "78efcf8c-eb36-478b-81b7-5b7d33f064c7", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
14392026-01-14T21:22:41.004ZDEBGtest_vpc_firewall: client request body = Some(Body) method = PUT uri = http://[::1]:60096/network-bootstore-config
14402026-01-14T21:22:41.004ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = GET remote_addr = [::1]:51682 req_id = 249d9287-1e7f-42e1-a84b-27954d48bde7 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
14412026-01-14T21:22:41.005ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = GET remote_addr = [::1]:51682 req_id = 249d9287-1e7f-42e1-a84b-27954d48bde7 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p version = 12.0.0
14422026-01-14T21:22:41.005ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: c9 21 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c .!..........._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:45024 req_id = d5dd8cd5-2d5b-4d31-8621-7a7c4e844e7c
14432026-01-14T21:22:41.005ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 51489,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:45024 req_id = d5dd8cd5-2d5b-4d31-8621-7a7c4e844e7c
14442026-01-14T21:22:41.005ZDEBGtest_vpc_firewall (store): query key key = _clickhouse-admin-keeper._tcp
14452026-01-14T21:22:41.006ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 51489, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } NXDOMAIN: _clickhouse-admin-keeper._tcp.control-plane.oxide.internal kind = dns peer_addr = [::1]:45024 req_id = d5dd8cd5-2d5b-4d31-8621-7a7c4e844e7c
14462026-01-14T21:22:41.008ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:60096/eip-gateways", status: 204, headers: {"x-request-id": "7db12026-7f3a-42b2-9161-06a5158f9e8e", "date": "Wed, 14 Jan 2026 21:22:40 GMT"} })
14472026-01-14T21:22:41.009ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 3.373412158s iteration = 1 status = {}
14482026-01-14T21:22:41.010ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = vpc_route_manager iteration = 2 reason = Dependency
14492026-01-14T21:22:41.010ZINFOtest_vpc_firewall (BackgroundTasks): VPC route manager running background_task = vpc_route_manager
14502026-01-14T21:22:41.010ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet
14512026-01-14T21:22:41.010ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14522026-01-14T21:22:41.010ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
14532026-01-14T21:22:41.010ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
14542026-01-14T21:22:41.010ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
14552026-01-14T21:22:41.013ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 8212 local_addr = [::1]:60096 method = GET remote_addr = [::1]:51682 req_id = 249d9287-1e7f-42e1-a84b-27954d48bde7 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /v2p
14562026-01-14T21:22:41.015ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication body = Some(Body) method = PUT uri = http://[::1]:60096/artifacts-config
14572026-01-14T21:22:41.017ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _cockroach._tcp.control-plane.oxide.internal
14582026-01-14T21:22:41.019ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:53965 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14592026-01-14T21:22:41.019ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = PUT remote_addr = [::1]:63174 req_id = e76eb346-ec08-4cbe-bd53-5797ac4561cd sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
14602026-01-14T21:22:41.019ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = PUT remote_addr = [::1]:63174 req_id = e76eb346-ec08-4cbe-bd53-5797ac4561cd sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config version = 12.0.0
14612026-01-14T21:22:41.020ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = v2p_manager result = Ok(Response { url: "http://[::1]:60096/v2p", status: 200, headers: {"content-type": "application/json", "x-request-id": "249d9287-1e7f-42e1-a84b-27954d48bde7", "content-length": "2", "date": "Wed, 14 Jan 2026 21:22:41 GMT"} })
14622026-01-14T21:22:41.021ZINFOtest_vpc_firewall (BackgroundTasks): found opte v2p mappings background_task = v2p_manager interfaces = {} sled = SimGimlet00
14632026-01-14T21:22:41.021ZINFOtest_vpc_firewall (BackgroundTasks): v2p mappings to delete background_task = v2p_manager mappings = [] sled = SimGimlet00
14642026-01-14T21:22:41.021ZINFOtest_vpc_firewall (BackgroundTasks): v2p mappings to add background_task = v2p_manager mappings = [] sled = SimGimlet00
14652026-01-14T21:22:41.025ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = v2p_manager elapsed = 3.34150606s iteration = 1 status = {}
14662026-01-14T21:22:41.028ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 8664 local_addr = [::1]:60096 method = PUT remote_addr = [::1]:63174 req_id = e76eb346-ec08-4cbe-bd53-5797ac4561cd response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /network-bootstore-config
14672026-01-14T21:22:41.029ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
14682026-01-14T21:22:41.029ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
14692026-01-14T21:22:41.029ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14702026-01-14T21:22:41.030ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14712026-01-14T21:22:41.031ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14722026-01-14T21:22:41.035ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = PUT remote_addr = [::1]:53965 req_id = 49a6fb14-289a-4836-8baa-4c8aaccc01c4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts-config
14732026-01-14T21:22:41.035ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = PUT remote_addr = [::1]:53965 req_id = 49a6fb14-289a-4836-8baa-4c8aaccc01c4 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts-config version = 12.0.0
14742026-01-14T21:22:41.046ZINFOtest_vpc_firewall (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmp3wosp4/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14752026-01-14T21:22:41.047ZDEBGtest_vpc_firewall (ArtifactStore): Failed to read ledger: Not found in storage path = /var/tmp/omicron_tmp/.tmp3wosp4/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14762026-01-14T21:22:41.047ZINFOtest_vpc_firewall (ArtifactStore): No ledger in /var/tmp/omicron_tmp/.tmpDRDbDf/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14772026-01-14T21:22:41.047ZDEBGtest_vpc_firewall (ArtifactStore): Failed to read ledger: Not found in storage path = /var/tmp/omicron_tmp/.tmpDRDbDf/artifact-config.json server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14782026-01-14T21:22:41.047ZINFOtest_vpc_firewall (ArtifactStore): Writing ledger to /var/tmp/omicron_tmp/.tmp3wosp4/.artifact-config.json.tmp server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
14792026-01-14T21:22:41.047ZDEBGtest_vpc_firewall: client response result = Ok(Response { url: "http://[::1]:60096/network-bootstore-config", status: 204, headers: {"x-request-id": "e76eb346-ec08-4cbe-bd53-5797ac4561cd", "date": "Wed, 14 Jan 2026 21:22:41 GMT"} })
14802026-01-14T21:22:41.050ZDEBGtest_vpc_firewall (init_with_steps): Running step start_nexus_external
14812026-01-14T21:22:41.050ZDEBGtest_vpc_firewall: Starting Nexus (external API)
14822026-01-14T21:22:43.883ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
14832026-01-14T21:22:43.883ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
14842026-01-14T21:22:43.883ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
14852026-01-14T21:22:43.883ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
14862026-01-14T21:22:43.885ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
14872026-01-14T21:22:43.887ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 73 (0x49) bytes\n0000: 0e 51 01 00 00 01 00 00 00 00 00 01 0a 5f 63 6f .Q..........._co\n0010: 63 6b 72 6f 61 63 68 04 5f 74 63 70 0d 63 6f 6e ckroach._tcp.con\n0020: 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 trol-plane.oxide\n0030: 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 .internal..!....\n0040: 29 04 d0 00 00 00 00 00 00 )........ kind = dns peer_addr = [::1]:61915 req_id = 4e4cd148-42cd-4cd8-b8c6-e7d9cddfc2e0
14882026-01-14T21:22:43.887ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 3665,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_cockroach._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_cockroach._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 10,\n 95,\n 99,\n 111,\n 99,\n 107,\n 114,\n 111,\n 97,\n 99,\n 104,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:61915 req_id = 4e4cd148-42cd-4cd8-b8c6-e7d9cddfc2e0
14892026-01-14T21:22:43.888ZDEBGtest_vpc_firewall (store): query key key = _cockroach._tcp
14902026-01-14T21:22:43.888ZDEBGtest_vpc_firewall (store): query key key = 4ca13454-dc8a-4ce2-981d-d389027c56d3.host
14912026-01-14T21:22:43.888ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:61915 query = LowerQuery { name: LowerName(Name("_cockroach._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 46432, target: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal") }) }] req_id = 4e4cd148-42cd-4cd8-b8c6-e7d9cddfc2e0
14922026-01-14T21:22:43.889ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
14932026-01-14T21:22:43.889ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
14942026-01-14T21:22:43.889ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
14952026-01-14T21:22:43.890ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
14962026-01-14T21:22:43.891ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
14972026-01-14T21:22:43.911ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
14982026-01-14T21:22:43.911ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet
14992026-01-14T21:22:43.911ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = vpc_route_manager resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15002026-01-14T21:22:43.912ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
15012026-01-14T21:22:43.912ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
15022026-01-14T21:22:43.912ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
15032026-01-14T21:22:43.914ZINFOtest_vpc_firewall (ArtifactStore): Writing ledger to /var/tmp/omicron_tmp/.tmpDRDbDf/.artifact-config.json.tmp server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
15042026-01-14T21:22:43.917ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _cockroach._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 46432, target: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10487, tv_nsec: 304546478 } })
15052026-01-14T21:22:43.918ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
15062026-01-14T21:22:43.919ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 2 reason = Timeout
15072026-01-14T21:22:43.919ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig
15082026-01-14T21:22:43.919ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = reconfigurator_config_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15092026-01-14T21:22:43.919ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
15102026-01-14T21:22:43.919ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
15112026-01-14T21:22:43.920ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
15122026-01-14T21:22:43.935ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
15132026-01-14T21:22:43.935ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15142026-01-14T21:22:43.935ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15152026-01-14T21:22:43.937ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15162026-01-14T21:22:43.938ZINFOtest_vpc_firewall (ArtifactStore): Starting delete reconciler generation = 1 server = b6d65341-167c-41df-9b5c-41cded99c229 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
15172026-01-14T21:22:43.939ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2904380 local_addr = [::1]:60096 method = PUT remote_addr = [::1]:53965 req_id = 49a6fb14-289a-4836-8baa-4c8aaccc01c4 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts-config
15182026-01-14T21:22:43.941ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15192026-01-14T21:22:43.948ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Fleet result = Ok(())
15202026-01-14T21:22:43.949ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
15212026-01-14T21:22:43.949ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
15222026-01-14T21:22:43.949ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
15232026-01-14T21:22:43.956ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15242026-01-14T21:22:43.963ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
15252026-01-14T21:22:43.963ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
15262026-01-14T21:22:43.963ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
15272026-01-14T21:22:43.964ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
15282026-01-14T21:22:43.970ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication result = Ok(Response { url: "http://[::1]:60096/artifacts-config", status: 204, headers: {"x-request-id": "49a6fb14-289a-4836-8baa-4c8aaccc01c4", "date": "Wed, 14 Jan 2026 21:22:43 GMT"} })
15292026-01-14T21:22:43.970ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication body = None method = GET uri = http://[::1]:60096/artifacts
15302026-01-14T21:22:43.971ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15312026-01-14T21:22:43.986ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
15322026-01-14T21:22:43.986ZTRACtest_vpc_firewall (BackgroundTasks): successful lookup of siloed resource "Vpc" using built-in user background_task = service_firewall_rule_propagation
15332026-01-14T21:22:43.986ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15342026-01-14T21:22:43.986ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15352026-01-14T21:22:43.987ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15362026-01-14T21:22:44.133ZINFOtest_vpc_firewall (BackgroundTasks): VPC route manager sled b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager
15372026-01-14T21:22:44.133ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = None method = GET uri = http://[::1]:60096/vpc-routes
15382026-01-14T21:22:44.140ZDEBGtest_vpc_firewall (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-14T21:22:37.508570Z })
15392026-01-14T21:22:44.140ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 221.31649ms iteration = 2 status = {"config_updated":false}
15402026-01-14T21:22:44.144ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
15412026-01-14T21:22:44.148ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
15422026-01-14T21:22:44.149ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
15432026-01-14T21:22:44.149ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
15442026-01-14T21:22:44.151ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
15452026-01-14T21:22:44.154ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = GET remote_addr = [::1]:53965 req_id = 7d1e7181-6c5f-4ed5-9772-e5992274eb60 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts
15462026-01-14T21:22:44.154ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = GET remote_addr = [::1]:53965 req_id = 7d1e7181-6c5f-4ed5-9772-e5992274eb60 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts version = 12.0.0
15472026-01-14T21:22:44.157ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:61548 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
15482026-01-14T21:22:44.172ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 0e 05 01 00 00 01 00 00 00 00 00 01 24 34 63 61 ............$4ca\n0010: 31 33 34 35 34 2d 64 63 38 61 2d 34 63 65 32 2d 13454-dc8a-4ce2-\n0020: 39 38 31 64 2d 64 33 38 39 30 32 37 63 35 36 64 981d-d389027c56d\n0030: 33 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 3.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:33784 req_id = d204f317-df68-4283-82bb-c6a52c08cf2b
15492026-01-14T21:22:44.172ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 3589,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 52,\n 99,\n 97,\n 49,\n 51,\n 52,\n 53,\n 52,\n 45,\n 100,\n 99,\n 56,\n 97,\n 45,\n 52,\n 99,\n 101,\n 50,\n 45,\n 57,\n 56,\n 49,\n 100,\n 45,\n 100,\n 51,\n 56,\n 57,\n 48,\n 50,\n 55,\n 99,\n 53,\n 54,\n 100,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:33784 req_id = d204f317-df68-4283-82bb-c6a52c08cf2b
15502026-01-14T21:22:44.172ZDEBGtest_vpc_firewall (store): query key key = 4ca13454-dc8a-4ce2-981d-d389027c56d3.host
15512026-01-14T21:22:44.177ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:33784 query = LowerQuery { name: LowerName(Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal.")), original: Query { name: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = d204f317-df68-4283-82bb-c6a52c08cf2b
15522026-01-14T21:22:44.206ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 51951 local_addr = [::1]:60096 method = GET remote_addr = [::1]:53965 req_id = 7d1e7181-6c5f-4ed5-9772-e5992274eb60 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /artifacts
15532026-01-14T21:22:44.212ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15542026-01-14T21:22:44.212ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15552026-01-14T21:22:44.216ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15562026-01-14T21:22:44.401ZDEBGtest_vpc_firewall (CockroachClusterAdminClient): Updated CockroachDB cluster backends added = 1 addresses = [[::1]:32222] removed = 0 total = 1
15572026-01-14T21:22:44.403ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection background_task = inventory_collection
15582026-01-14T21:22:44.403ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:59250
15592026-01-14T21:22:44.403ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/ignition
15602026-01-14T21:22:44.405ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = GET remote_addr = [::1]:61548 req_id = 241f76fc-0507-4ae4-ab9d-a19fa52e33d8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
15612026-01-14T21:22:44.405ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = GET remote_addr = [::1]:61548 req_id = 241f76fc-0507-4ae4-ab9d-a19fa52e33d8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes version = 12.0.0
15622026-01-14T21:22:44.406ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 86 7f 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 ............._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:52434 req_id = ad7e1e3e-a5bd-4ed1-b309-c5289faf9388
15632026-01-14T21:22:44.406ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 34431,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:52434 req_id = ad7e1e3e-a5bd-4ed1-b309-c5289faf9388
15642026-01-14T21:22:44.406ZDEBGtest_vpc_firewall (store): query key key = _mgs._tcp
15652026-01-14T21:22:44.406ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
15662026-01-14T21:22:44.406ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:52434 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = ad7e1e3e-a5bd-4ed1-b309-c5289faf9388
15672026-01-14T21:22:44.407ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 74 (0x4a) bytes\n0000: 33 c2 01 00 00 01 00 00 00 00 00 01 0b 5f 72 65 3............_re\n0010: 70 6f 2d 64 65 70 6f 74 04 5f 74 63 70 0d 63 6f po-depot._tcp.co\n0020: 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 ntrol-plane.oxid\n0030: 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 e.internal..!...\n0040: 00 29 04 d0 00 00 00 00 00 00 .)........ kind = dns peer_addr = [::1]:52945 req_id = 913c5943-4577-4800-8700-c253c56d7e44
15682026-01-14T21:22:44.407ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 13250,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_repo-depot._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_repo-depot._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 11,\n 95,\n 114,\n 101,\n 112,\n 111,\n 45,\n 100,\n 101,\n 112,\n 111,\n 116,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:52945 req_id = 913c5943-4577-4800-8700-c253c56d7e44
15692026-01-14T21:22:44.407ZDEBGtest_vpc_firewall (store): query key key = _repo-depot._tcp
15702026-01-14T21:22:44.407ZDEBGtest_vpc_firewall (store): query key key = b6d65341-167c-41df-9b5c-41cded99c229.sled
15712026-01-14T21:22:44.407ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:52945 query = LowerQuery { name: LowerName(Name("_repo-depot._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_repo-depot._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_repo-depot._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 52160, target: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal") }) }] req_id = 913c5943-4577-4800-8700-c253c56d7e44
15722026-01-14T21:22:44.408ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 79 (0x4f) bytes\n0000: 91 5c 01 00 00 01 00 00 00 00 00 01 10 5f 63 72 .\\..........._cr\n0010: 75 63 69 62 6c 65 2d 70 61 6e 74 72 79 04 5f 74 ucible-pantry._t\n0020: 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 cp.control-plane\n0030: 05 6f 78 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 .oxide.internal.\n0040: 00 21 00 01 00 00 29 04 d0 00 00 00 00 00 00 .!....)........ kind = dns peer_addr = [::1]:62782 req_id = 40ebcf14-2be7-4169-b9e7-e9021ba6a3f6
15732026-01-14T21:22:44.408ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 37212,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 16,\n 95,\n 99,\n 114,\n 117,\n 99,\n 105,\n 98,\n 108,\n 101,\n 45,\n 112,\n 97,\n 110,\n 116,\n 114,\n 121,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:62782 req_id = 40ebcf14-2be7-4169-b9e7-e9021ba6a3f6
15742026-01-14T21:22:44.408ZDEBGtest_vpc_firewall (store): query key key = _crucible-pantry._tcp
15752026-01-14T21:22:44.408ZDEBGtest_vpc_firewall (store): query key key = 077622b5-37ad-4801-a59d-22b17b3a7e04.host
15762026-01-14T21:22:44.408ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:62782 query = LowerQuery { name: LowerName(Name("_crucible-pantry._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_crucible-pantry._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 60375, target: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal") }) }] req_id = 40ebcf14-2be7-4169-b9e7-e9021ba6a3f6
15772026-01-14T21:22:44.408ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = tuf_artifact_replication result = Ok(Response { url: "http://[::1]:60096/artifacts", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d1e7181-6c5f-4ed5-9772-e5992274eb60", "content-length": "26", "date": "Wed, 14 Jan 2026 21:22:44 GMT"} })
15782026-01-14T21:22:44.409ZINFOtest_vpc_firewall (BackgroundTasks): Successfully got artifact list background_task = tuf_artifact_replication sled = http://[::1]:60096
15792026-01-14T21:22:44.410ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4557 local_addr = [::1]:60096 method = GET remote_addr = [::1]:61548 req_id = 241f76fc-0507-4ae4-ab9d-a19fa52e33d8 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc-routes
15802026-01-14T21:22:44.412ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = tuf_artifact_replication elapsed = 6.545162158s iteration = 1 status = {"generation":1,"last_run_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":1,"put_config_err":0,"put_config_ok":1,"put_err":0,"put_ok":0},"lifetime_counters":{"copy_err":0,"copy_ok":0,"list_err":0,"list_ok":1,"put_config_err":0,"put_config_ok":1,"put_err":0,"put_ok":0},"local_repos":0,"request_debug_ringbuf":[{"generation":1,"operation":"put_config","target_sled":"b6d65341-167c-41df-9b5c-41cded99c229","time":"2026-01-14T21:22:43.970127574Z"},{"operation":"list","target_sled":"b6d65341-167c-41df-9b5c-41cded99c229","time":"2026-01-14T21:22:44.409139268Z"}]}
15812026-01-14T21:22:44.420ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
15822026-01-14T21:22:44.420ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
15832026-01-14T21:22:44.421ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
15842026-01-14T21:22:44.423ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:60096/vpc-routes", status: 200, headers: {"content-type": "application/json", "x-request-id": "241f76fc-0507-4ae4-ab9d-a19fa52e33d8", "content-length": "2", "date": "Wed, 14 Jan 2026 21:22:44 GMT"} })
15852026-01-14T21:22:44.423ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database
15862026-01-14T21:22:44.423ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = vpc_route_manager roles = RoleSet { roles: {} }
15872026-01-14T21:22:44.424ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = vpc_route_manager resource = Database result = Ok(())
15882026-01-14T21:22:44.428ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
15892026-01-14T21:22:44.428ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
15902026-01-14T21:22:44.430ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
15912026-01-14T21:22:44.436ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 58 45 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e XE..........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:63715 req_id = 084b6e45-1324-43d5-b535-b695e7a24772
15922026-01-14T21:22:44.436ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 22597,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:63715 req_id = 084b6e45-1324-43d5-b535-b695e7a24772
15932026-01-14T21:22:44.437ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
15942026-01-14T21:22:44.437ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:63715 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 084b6e45-1324-43d5-b535-b695e7a24772
15952026-01-14T21:22:44.437ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 9c 75 01 00 00 01 00 00 00 00 00 01 24 62 36 64 .u..........$b6d\n0010: 36 35 33 34 31 2d 31 36 37 63 2d 34 31 64 66 2d 65341-167c-41df-\n0020: 39 62 35 63 2d 34 31 63 64 65 64 39 39 63 32 32 9b5c-41cded99c22\n0030: 39 04 73 6c 65 64 0d 63 6f 6e 74 72 6f 6c 2d 70 9.sled.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:62194 req_id = 08798477-1e5a-436c-b151-e9c767313ad6
15962026-01-14T21:22:44.437ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 40053,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 115,\n 108,\n 101,\n 100,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:62194 req_id = 08798477-1e5a-436c-b151-e9c767313ad6
15972026-01-14T21:22:44.437ZDEBGtest_vpc_firewall (store): query key key = b6d65341-167c-41df-9b5c-41cded99c229.sled
15982026-01-14T21:22:44.437ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:62194 query = LowerQuery { name: LowerName(Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal.")), original: Query { name: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("b6d65341-167c-41df-9b5c-41cded99c229.sled.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 08798477-1e5a-436c-b151-e9c767313ad6
15992026-01-14T21:22:44.437ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: b1 e7 01 00 00 01 00 00 00 00 00 01 24 30 37 37 ............$077\n0010: 36 32 32 62 35 2d 33 37 61 64 2d 34 38 30 31 2d 622b5-37ad-4801-\n0020: 61 35 39 64 2d 32 32 62 31 37 62 33 61 37 65 30 a59d-22b17b3a7e0\n0030: 34 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 4.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:52647 req_id = cba41c70-bca3-442e-8698-41aa6031cadb
16002026-01-14T21:22:44.437ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 45543,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 48,\n 55,\n 55,\n 54,\n 50,\n 50,\n 98,\n 53,\n 45,\n 51,\n 55,\n 97,\n 100,\n 45,\n 52,\n 56,\n 48,\n 49,\n 45,\n 97,\n 53,\n 57,\n 100,\n 45,\n 50,\n 50,\n 98,\n 49,\n 55,\n 98,\n 51,\n 97,\n 55,\n 101,\n 48,\n 52,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:52647 req_id = cba41c70-bca3-442e-8698-41aa6031cadb
16012026-01-14T21:22:44.437ZDEBGtest_vpc_firewall (store): query key key = 077622b5-37ad-4801-a59d-22b17b3a7e04.host
16022026-01-14T21:22:44.437ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:52647 query = LowerQuery { name: LowerName(Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal.")), original: Query { name: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("077622b5-37ad-4801-a59d-22b17b3a7e04.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = cba41c70-bca3-442e-8698-41aa6031cadb
16032026-01-14T21:22:44.448ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16042026-01-14T21:22:44.448ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16052026-01-14T21:22:44.450ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16062026-01-14T21:22:44.552ZINFOtest_vpc_firewall (BackgroundTasks): computed internet gateway mappings for sled assocs = {} background_task = vpc_route_manager sled = SimGimlet00
16072026-01-14T21:22:44.552ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager body = Some(Body) method = PUT uri = http://[::1]:60096/eip-gateways
16082026-01-14T21:22:44.552ZINFOtest_vpc_firewall (InternalApi): set cockroachdb setting setting = cluster.preserve_downgrade_option value = 22.1
16092026-01-14T21:22:44.552ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16102026-01-14T21:22:44.553ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
16112026-01-14T21:22:44.554ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16122026-01-14T21:22:44.555ZINFOtest_vpc_firewall (dropshot): accepted connection kind = pantry local_addr = [::1]:60375 remote_addr = [::1]:45569 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
16132026-01-14T21:22:44.556ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = PUT remote_addr = [::1]:61548 req_id = 452035b8-a932-4f84-94f5-78fe1280f160 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
16142026-01-14T21:22:44.556ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = PUT remote_addr = [::1]:61548 req_id = 452035b8-a932-4f84-94f5-78fe1280f160 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways version = 12.0.0
16152026-01-14T21:22:44.562ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 6817 local_addr = [::1]:60096 method = PUT remote_addr = [::1]:61548 req_id = 452035b8-a932-4f84-94f5-78fe1280f160 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /eip-gateways
16162026-01-14T21:22:44.564ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
16172026-01-14T21:22:44.564ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16182026-01-14T21:22:44.564ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16192026-01-14T21:22:44.564ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16202026-01-14T21:22:44.565ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16212026-01-14T21:22:44.569ZTRACtest_vpc_firewall (dropshot): incoming request kind = pantry local_addr = [::1]:60375 method = GET remote_addr = [::1]:45569 req_id = a4fbd1e4-c563-4487-a7db-cfce7337df49 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16222026-01-14T21:22:44.570ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "1cfdb4b1-2f19-4c65-bed5-a5066cfa2193", "content-length": "835", "date": "Wed, 14 Jan 2026 21:22:44 GMT"} })
16232026-01-14T21:22:44.571ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0
16242026-01-14T21:22:44.571ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 background_task = vpc_route_manager result = Ok(Response { url: "http://[::1]:60096/eip-gateways", status: 204, headers: {"x-request-id": "452035b8-a932-4f84-94f5-78fe1280f160", "date": "Wed, 14 Jan 2026 21:22:44 GMT"} })
16252026-01-14T21:22:44.572ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = vpc_route_manager elapsed = 3.562945762s iteration = 2 status = {}
16262026-01-14T21:22:44.573ZINFOtest_vpc_firewall (dropshot): request completed kind = pantry latency_us = 3606 local_addr = [::1]:60375 method = GET remote_addr = [::1]:45569 req_id = a4fbd1e4-c563-4487-a7db-cfce7337df49 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16272026-01-14T21:22:44.582ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16282026-01-14T21:22:44.582ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16292026-01-14T21:22:44.582ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16302026-01-14T21:22:44.584ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16312026-01-14T21:22:45.480ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
16322026-01-14T21:22:45.483ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16332026-01-14T21:22:45.483ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16342026-01-14T21:22:45.483ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
16352026-01-14T21:22:45.485ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16362026-01-14T21:22:45.487ZINFOtest_vpc_firewall (dropshot): accepted connection kind = pantry local_addr = [::1]:60375 remote_addr = [::1]:41662 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
16372026-01-14T21:22:45.487ZINFOtest_vpc_firewall (dropshot): accepted connection kind = pantry local_addr = [::1]:60375 remote_addr = [::1]:36760 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
16382026-01-14T21:22:45.487ZINFOtest_vpc_firewall (dropshot): accepted connection kind = pantry local_addr = [::1]:60375 remote_addr = [::1]:56562 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
16392026-01-14T21:22:45.488ZINFOtest_vpc_firewall (dropshot): accepted connection kind = pantry local_addr = [::1]:60375 remote_addr = [::1]:54154 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
16402026-01-14T21:22:45.488ZINFOtest_vpc_firewall (dropshot): accepted connection kind = pantry local_addr = [::1]:60375 remote_addr = [::1]:60714 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
16412026-01-14T21:22:45.488ZINFOtest_vpc_firewall (dropshot): accepted connection kind = pantry local_addr = [::1]:60375 remote_addr = [::1]:55211 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
16422026-01-14T21:22:45.488ZINFOtest_vpc_firewall (dropshot): accepted connection kind = pantry local_addr = [::1]:60375 remote_addr = [::1]:65427 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
16432026-01-14T21:22:45.489ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16442026-01-14T21:22:45.489ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16452026-01-14T21:22:45.489ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16462026-01-14T21:22:45.490ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16472026-01-14T21:22:45.498ZTRACtest_vpc_firewall (dropshot): incoming request kind = pantry local_addr = [::1]:60375 method = GET remote_addr = [::1]:41662 req_id = 388cf598-de3b-4485-87f3-40b06878c8ef sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16482026-01-14T21:22:45.499ZTRACtest_vpc_firewall (dropshot): incoming request kind = pantry local_addr = [::1]:60375 method = GET remote_addr = [::1]:36760 req_id = 566a9198-2b07-4d85-a4b2-1b6c479402e8 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16492026-01-14T21:22:45.499ZTRACtest_vpc_firewall (dropshot): incoming request kind = pantry local_addr = [::1]:60375 method = GET remote_addr = [::1]:56562 req_id = 7975986c-2a89-4496-88d4-ec36a174d9ad sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16502026-01-14T21:22:45.499ZTRACtest_vpc_firewall (dropshot): incoming request kind = pantry local_addr = [::1]:60375 method = GET remote_addr = [::1]:54154 req_id = 0fd0da64-b5c2-43e8-a4f9-124fe75a8e87 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16512026-01-14T21:22:45.499ZTRACtest_vpc_firewall (dropshot): incoming request kind = pantry local_addr = [::1]:60375 method = GET remote_addr = [::1]:60714 req_id = 7ea7d393-30ab-41e2-b944-6f62e8b47250 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16522026-01-14T21:22:45.499ZTRACtest_vpc_firewall (dropshot): incoming request kind = pantry local_addr = [::1]:60375 method = GET remote_addr = [::1]:55211 req_id = 938c9b38-9466-48ae-ba6a-befa61be5c79 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16532026-01-14T21:22:45.500ZTRACtest_vpc_firewall (dropshot): incoming request kind = pantry local_addr = [::1]:60375 method = GET remote_addr = [::1]:65427 req_id = ccb3ead4-1d8a-4b04-a8e8-cebbfebc17fb sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16542026-01-14T21:22:45.503ZINFOtest_vpc_firewall (dropshot): request completed kind = pantry latency_us = 4610 local_addr = [::1]:60375 method = GET remote_addr = [::1]:41662 req_id = 388cf598-de3b-4485-87f3-40b06878c8ef response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16552026-01-14T21:22:45.503ZINFOtest_vpc_firewall (dropshot): request completed kind = pantry latency_us = 4383 local_addr = [::1]:60375 method = GET remote_addr = [::1]:36760 req_id = 566a9198-2b07-4d85-a4b2-1b6c479402e8 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16562026-01-14T21:22:45.503ZINFOtest_vpc_firewall (dropshot): request completed kind = pantry latency_us = 4274 local_addr = [::1]:60375 method = GET remote_addr = [::1]:56562 req_id = 7975986c-2a89-4496-88d4-ec36a174d9ad response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16572026-01-14T21:22:45.503ZINFOtest_vpc_firewall (dropshot): request completed kind = pantry latency_us = 4160 local_addr = [::1]:60375 method = GET remote_addr = [::1]:54154 req_id = 0fd0da64-b5c2-43e8-a4f9-124fe75a8e87 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16582026-01-14T21:22:45.503ZINFOtest_vpc_firewall (dropshot): request completed kind = pantry latency_us = 4087 local_addr = [::1]:60375 method = GET remote_addr = [::1]:60714 req_id = 7ea7d393-30ab-41e2-b944-6f62e8b47250 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16592026-01-14T21:22:45.503ZINFOtest_vpc_firewall (dropshot): request completed kind = pantry latency_us = 3979 local_addr = [::1]:60375 method = GET remote_addr = [::1]:55211 req_id = 938c9b38-9466-48ae-ba6a-befa61be5c79 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16602026-01-14T21:22:45.504ZINFOtest_vpc_firewall (dropshot): request completed kind = pantry latency_us = 3914 local_addr = [::1]:60375 method = GET remote_addr = [::1]:65427 req_id = ccb3ead4-1d8a-4b04-a8e8-cebbfebc17fb response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /crucible/pantry/0
16612026-01-14T21:22:45.504ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16622026-01-14T21:22:45.535ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
16632026-01-14T21:22:45.535ZDEBGtest_vpc_firewall (InternalApi): updating rack subnet for rack c19a698f-c6f9-4a17-ae30-20d711b8f7dc to Some( V6( Ipv6Network { addr: fd00:1122:3344:100::, prefix: 56, }, ), )
16642026-01-14T21:22:45.535ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16652026-01-14T21:22:45.535ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
16662026-01-14T21:22:45.536ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16672026-01-14T21:22:45.540ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16682026-01-14T21:22:45.565ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
16692026-01-14T21:22:45.565ZTRACtest_vpc_firewall (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
16702026-01-14T21:22:45.565ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
16712026-01-14T21:22:45.565ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
16722026-01-14T21:22:45.565ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16732026-01-14T21:22:45.565ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16742026-01-14T21:22:45.566ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16752026-01-14T21:22:45.578ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
16762026-01-14T21:22:45.578ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16772026-01-14T21:22:45.578ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16782026-01-14T21:22:45.582ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16792026-01-14T21:22:45.585ZINFOtest_vpc_firewall (InternalApi): Using static configuration for external switchports
16802026-01-14T21:22:45.585ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
16812026-01-14T21:22:45.585ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
16822026-01-14T21:22:45.588ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
16832026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ce846b15-de3e-483e-8675-13318dfc0db7", "content-length": "734", "date": "Wed, 14 Jan 2026 21:22:45 GMT"} })
16842026-01-14T21:22:45.592ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=0
16852026-01-14T21:22:45.604ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
16862026-01-14T21:22:45.604ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16872026-01-14T21:22:45.605ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16882026-01-14T21:22:45.605ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16892026-01-14T21:22:45.615ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
16902026-01-14T21:22:45.638ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
16912026-01-14T21:22:45.638ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16922026-01-14T21:22:45.638ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16932026-01-14T21:22:45.639ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16942026-01-14T21:22:45.650ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16952026-01-14T21:22:45.651ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16962026-01-14T21:22:45.657ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
16972026-01-14T21:22:45.675ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
16982026-01-14T21:22:45.675ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
16992026-01-14T21:22:45.676ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17002026-01-14T21:22:45.687ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17012026-01-14T21:22:45.687ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17022026-01-14T21:22:45.689ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17032026-01-14T21:22:45.705ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17042026-01-14T21:22:45.709ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17052026-01-14T21:22:45.710ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17062026-01-14T21:22:45.716ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17072026-01-14T21:22:45.717ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
17082026-01-14T21:22:45.718ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17092026-01-14T21:22:45.723ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17102026-01-14T21:22:45.723ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17112026-01-14T21:22:45.723ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17122026-01-14T21:22:45.723ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17132026-01-14T21:22:45.724ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17142026-01-14T21:22:45.746ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17152026-01-14T21:22:45.747ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17162026-01-14T21:22:45.747ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17172026-01-14T21:22:45.748ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17182026-01-14T21:22:45.756ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17192026-01-14T21:22:45.756ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17202026-01-14T21:22:45.756ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17212026-01-14T21:22:45.757ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17222026-01-14T21:22:45.780ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17232026-01-14T21:22:45.791ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17242026-01-14T21:22:45.791ZTRACtest_vpc_firewall (BackgroundTasks): successful lookup of siloed resource "VpcSubnet" using built-in user background_task = service_firewall_rule_propagation
17252026-01-14T21:22:45.791ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
17262026-01-14T21:22:45.791ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
17272026-01-14T21:22:45.791ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17282026-01-14T21:22:45.791ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17292026-01-14T21:22:45.792ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17302026-01-14T21:22:45.794ZINFOtest_vpc_firewall (InternalApi): Recording Rack Network Configuration
17312026-01-14T21:22:45.794ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17322026-01-14T21:22:45.794ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
17332026-01-14T21:22:45.795ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17342026-01-14T21:22:45.812ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
17352026-01-14T21:22:45.813ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17362026-01-14T21:22:45.813ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17372026-01-14T21:22:45.815ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17382026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "18750ca9-410d-487e-9745-96614b124d77", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:45 GMT"} })
17392026-01-14T21:22:45.819ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=1
17402026-01-14T21:22:45.824ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17412026-01-14T21:22:45.825ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17422026-01-14T21:22:45.825ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17432026-01-14T21:22:45.827ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17442026-01-14T21:22:45.834ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17452026-01-14T21:22:45.846ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
17462026-01-14T21:22:45.847ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17472026-01-14T21:22:45.847ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17482026-01-14T21:22:45.847ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17492026-01-14T21:22:45.882ZDEBGtest_vpc_firewall (service-firewall-rule-progator): resolved names for firewall rules background_task = service_firewall_rule_propagation instance_interfaces = {} subnet_interfaces = {} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
17502026-01-14T21:22:45.893ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Fleet
17512026-01-14T21:22:45.893ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = service_firewall_rule_propagation resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17522026-01-14T21:22:45.893ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17532026-01-14T21:22:45.893ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17542026-01-14T21:22:45.893ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17552026-01-14T21:22:45.915ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17562026-01-14T21:22:45.932ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Fleet result = Ok(())
17572026-01-14T21:22:45.932ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database
17582026-01-14T21:22:45.933ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = service_firewall_rule_propagation roles = RoleSet { roles: {} }
17592026-01-14T21:22:45.933ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = service_firewall_rule_propagation resource = Database result = Ok(())
17602026-01-14T21:22:45.964ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "cc4593f4-c34b-4ef1-adc7-afafc3f08db0", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:45 GMT"} })
17612026-01-14T21:22:45.977ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=0
17622026-01-14T21:22:45.979ZTRACtest_vpc_firewall (service-firewall-rule-progator): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-14T19:25:04.038956Z, time_modified: 2026-01-14T19:25:04.038956Z, allowed_ips: None } background_task = service_firewall_rule_propagation
17632026-01-14T21:22:45.979ZDEBGtest_vpc_firewall (service-firewall-rule-progator): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified. background_task = service_firewall_rule_propagation
17642026-01-14T21:22:45.979ZDEBGtest_vpc_firewall (service-firewall-rule-progator): resolved firewall rules for sled agents background_task = service_firewall_rule_propagation sled_agent_rules = []
17652026-01-14T21:22:45.979ZDEBGtest_vpc_firewall (service-firewall-rule-progator): resolved 0 rules for sleds background_task = service_firewall_rule_propagation
17662026-01-14T21:22:45.985ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9e7f48c-3a28-457e-b4f0-e82068f38fdd", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:45 GMT"} })
17672026-01-14T21:22:45.985ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=1
17682026-01-14T21:22:46.008ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "5bbec51d-b27d-4ed1-bf3a-672fe1a53d09", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
17692026-01-14T21:22:46.008ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=0
17702026-01-14T21:22:46.021ZTRACtest_vpc_firewall (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
17712026-01-14T21:22:46.021ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17722026-01-14T21:22:46.021ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17732026-01-14T21:22:46.021ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
17742026-01-14T21:22:46.023ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17752026-01-14T21:22:46.029ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17762026-01-14T21:22:46.038ZDEBGtest_vpc_firewall (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
17772026-01-14T21:22:46.038ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17782026-01-14T21:22:46.039ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
17792026-01-14T21:22:46.040ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17802026-01-14T21:22:46.069ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
17812026-01-14T21:22:46.069ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17822026-01-14T21:22:46.069ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17832026-01-14T21:22:46.069ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
17842026-01-14T21:22:46.070ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17852026-01-14T21:22:46.091ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e55a845-c6bc-4738-911a-44e2424eccbd", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
17862026-01-14T21:22:46.091ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=1
17872026-01-14T21:22:46.118ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
17882026-01-14T21:22:46.132ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") } result = Ok(())
17892026-01-14T21:22:46.132ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17902026-01-14T21:22:46.132ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
17912026-01-14T21:22:46.133ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17922026-01-14T21:22:46.149ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: e7fc1aae-3ac4-4e40-8339-6e1cd88cab04, lookup_type: ByName("oxide-service-pool-v6") }
17932026-01-14T21:22:46.149ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
17942026-01-14T21:22:46.149ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
17952026-01-14T21:22:46.149ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
17962026-01-14T21:22:46.151ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
17972026-01-14T21:22:46.159ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "80fe2562-231d-4e5d-861a-e15eb57f339e", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
17982026-01-14T21:22:46.159ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/cmpa
17992026-01-14T21:22:46.160ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18002026-01-14T21:22:46.170ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: e7fc1aae-3ac4-4e40-8339-6e1cd88cab04, lookup_type: ByName("oxide-service-pool-v6") } result = Ok(())
18012026-01-14T21:22:46.170ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18022026-01-14T21:22:46.170ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
18032026-01-14T21:22:46.171ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18042026-01-14T21:22:46.177ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4cbcaa6e-5c70-4478-b102-519d801e2362", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18052026-01-14T21:22:46.178ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
18062026-01-14T21:22:46.184ZTRACtest_vpc_firewall (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
18072026-01-14T21:22:46.184ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18082026-01-14T21:22:46.185ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18092026-01-14T21:22:46.185ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
18102026-01-14T21:22:46.186ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18112026-01-14T21:22:46.300ZDEBGtest_vpc_firewall (service-firewall-rule-progator): resolved sleds for vpc oxide-services background_task = service_firewall_rule_propagation vpc_to_sled = []
18122026-01-14T21:22:46.300ZDEBGtest_vpc_firewall (service-firewall-rule-progator): sending firewall rules to sled agents background_task = service_firewall_rule_propagation
18132026-01-14T21:22:46.301ZINFOtest_vpc_firewall (service-firewall-rule-progator): updated firewall rules on 0 sleds background_task = service_firewall_rule_propagation
18142026-01-14T21:22:46.301ZDEBGtest_vpc_firewall (service-firewall-rule-progator): successfully propagated service firewall rules background_task = service_firewall_rule_propagation elapsed = 8.607401948s
18152026-01-14T21:22:46.301ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = service_firewall_rule_propagation elapsed = 8.607484109s iteration = 1 status = {}
18162026-01-14T21:22:46.302ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "86049176-fabe-4705-9dd8-4b67c62d6f2f", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18172026-01-14T21:22:46.303ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
18182026-01-14T21:22:46.305ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "744c586d-3c27-4430-9b79-06371205dc04", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18192026-01-14T21:22:46.305ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
18202026-01-14T21:22:46.307ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "03f59a31-fa77-4498-b319-a8741b02f318", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18212026-01-14T21:22:46.307ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1
18222026-01-14T21:22:46.310ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "90daaac7-617e-4dde-ac0d-dc8ceea369a4", "content-length": "734", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18232026-01-14T21:22:46.311ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=0
18242026-01-14T21:22:46.312ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18252026-01-14T21:22:46.325ZDEBGtest_vpc_firewall (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") } result = Ok(())
18262026-01-14T21:22:46.332ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "26c4447f-a00f-4923-ba70-ec8f43a11d54", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18272026-01-14T21:22:46.333ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=1
18282026-01-14T21:22:46.345ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b0e0e98b-9c71-43cb-96d4-bec98288b854", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18292026-01-14T21:22:46.346ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=0
18302026-01-14T21:22:46.346ZTRACtest_vpc_firewall (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: e7fc1aae-3ac4-4e40-8339-6e1cd88cab04, lookup_type: ByName("oxide-service-pool-v6") }
18312026-01-14T21:22:46.346ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18322026-01-14T21:22:46.346ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18332026-01-14T21:22:46.346ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
18342026-01-14T21:22:46.346ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18352026-01-14T21:22:46.353ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1a3f23e3-f1f4-4648-8cdb-0f5c628f67b5", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18362026-01-14T21:22:46.353ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=1
18372026-01-14T21:22:46.357ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "fd5a1b47-54eb-43f0-8bbf-c71ac68e8ce3", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18382026-01-14T21:22:46.357ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=0
18392026-01-14T21:22:46.359ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "f24046fc-ef42-4cdc-b5c4-76a5f395ae9a", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18402026-01-14T21:22:46.359ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=1
18412026-01-14T21:22:46.362ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c30efa44-8cb4-4057-a886-80ca508920ff", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18422026-01-14T21:22:46.362ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/cmpa
18432026-01-14T21:22:46.368ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18442026-01-14T21:22:46.374ZDEBGtest_vpc_firewall (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: e7fc1aae-3ac4-4e40-8339-6e1cd88cab04, lookup_type: ByName("oxide-service-pool-v6") } result = Ok(())
18452026-01-14T21:22:46.377ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e219a02-c9e4-42ba-8e36-ae8e84ecdd58", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18462026-01-14T21:22:46.377ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
18472026-01-14T21:22:46.378ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d6aada16-7d05-43b4-b3e1-5cac040a533c", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18482026-01-14T21:22:46.379ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
18492026-01-14T21:22:46.381ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "588c4a4e-ea84-49b3-bdc2-3f3f46ea6dc1", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18502026-01-14T21:22:46.381ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
18512026-01-14T21:22:46.382ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "446fa1e2-e51f-48cc-ba84-83c16ba17168", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18522026-01-14T21:22:46.383ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0
18532026-01-14T21:22:46.385ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4e06cfbd-513e-4b7c-bee2-1a49699e426b", "content-length": "723", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18542026-01-14T21:22:46.385ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/active-slot
18552026-01-14T21:22:46.387ZTRACtest_vpc_firewall (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") }
18562026-01-14T21:22:46.387ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18572026-01-14T21:22:46.387ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18582026-01-14T21:22:46.387ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
18592026-01-14T21:22:46.388ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18602026-01-14T21:22:46.390ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "fadf0876-d0e5-4961-a113-ae17a1914a59", "content-length": "10", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18612026-01-14T21:22:46.390ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/0
18622026-01-14T21:22:46.393ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "8294fd5d-f2ae-46a7-8a8f-07580fec1d77", "content-length": "144", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18632026-01-14T21:22:46.417ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/1
18642026-01-14T21:22:46.418ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18652026-01-14T21:22:46.435ZDEBGtest_vpc_firewall (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = IpPool { parent: Fleet, key: 949bfaea-30eb-440f-8099-6be36c6d67b1, lookup_type: ByName("oxide-service-pool-v4") } result = Ok(())
18662026-01-14T21:22:46.442ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c7ed00d2-2c7a-42bb-b058-6ecd9b34d7a6", "content-length": "147", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18672026-01-14T21:22:46.444ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=0
18682026-01-14T21:22:46.451ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig
18692026-01-14T21:22:46.451ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
18702026-01-14T21:22:46.451ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
18712026-01-14T21:22:46.451ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
18722026-01-14T21:22:46.452ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
18732026-01-14T21:22:46.459ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
18742026-01-14T21:22:46.469ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig result = Ok(())
18752026-01-14T21:22:46.477ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ee2045cb-3c12-4e75-8c24-4506f47ade6f", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18762026-01-14T21:22:46.477ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=1
18772026-01-14T21:22:46.483ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "25462fa0-703f-4757-b0d4-6a38a61e93fd", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18782026-01-14T21:22:46.483ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=0
18792026-01-14T21:22:46.506ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "1486c6e5-63de-4311-b9d6-a6452da426be", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18802026-01-14T21:22:46.507ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=1
18812026-01-14T21:22:46.513ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "767ce8ae-86a2-468d-ad27-d556b1aa7c4c", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18822026-01-14T21:22:46.513ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=0
18832026-01-14T21:22:46.518ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2041018c-4263-4764-aa02-38c0a6cffae0", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18842026-01-14T21:22:46.519ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=1
18852026-01-14T21:22:46.523ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "b5b509b1-d148-4100-a966-68c555448c95", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18862026-01-14T21:22:46.523ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/cmpa
18872026-01-14T21:22:46.525ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a7cc7289-0d3b-4a26-b40e-62acebd20d59", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18882026-01-14T21:22:46.525ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
18892026-01-14T21:22:46.568ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "aa01bb71-4ac2-42bc-bf58-088740f2913c", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18902026-01-14T21:22:46.568ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
18912026-01-14T21:22:46.570ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "9e0e3e45-5b7b-44c4-901b-99eaa2c83d42", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18922026-01-14T21:22:46.570ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
18932026-01-14T21:22:46.572ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1584ab13-93d1-4370-ac54-a085d38d8c4f", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18942026-01-14T21:22:46.572ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1
18952026-01-14T21:22:46.574ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "af0d9be7-b308-4fd3-9e87-72642983b675", "content-length": "723", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18962026-01-14T21:22:46.575ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/active-slot
18972026-01-14T21:22:46.576ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "269913b9-5e6f-4e11-b328-23beeaff50fa", "content-length": "10", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
18982026-01-14T21:22:46.576ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/0
18992026-01-14T21:22:46.580ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "3468c2a0-e143-48b5-b590-549aa8f0d182", "content-length": "144", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19002026-01-14T21:22:46.581ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/1
19012026-01-14T21:22:46.585ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "edb0516e-aa0c-44dd-86a8-9a1782af9e5f", "content-length": "147", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19022026-01-14T21:22:46.585ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=0
19032026-01-14T21:22:46.589ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "65f4736e-2789-4074-8ca2-7941b08a5da8", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19042026-01-14T21:22:46.589ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=1
19052026-01-14T21:22:46.592ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d07f0ad-ebbe-4264-aafe-67d094e53cc6", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19062026-01-14T21:22:46.592ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=0
19072026-01-14T21:22:46.660ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "90534d2a-d5d9-410e-8b04-65591f7a3e0d", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19082026-01-14T21:22:46.660ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=1
19092026-01-14T21:22:46.692ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c21c9d1c-e655-41ff-b32b-10120ab54206", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19102026-01-14T21:22:46.693ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=0
19112026-01-14T21:22:46.695ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "75f146a6-bbf0-47b3-a3f9-32fbac549b1e", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19122026-01-14T21:22:46.695ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=1
19132026-01-14T21:22:46.698ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "26a34c36-efec-4007-890e-bc5d6fb60d07", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19142026-01-14T21:22:46.698ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/cmpa
19152026-01-14T21:22:46.699ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "0a18bf5e-283e-4b36-909c-0c3c0ced79d1", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19162026-01-14T21:22:46.699ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
19172026-01-14T21:22:46.701ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "fbf767b6-a9ff-4409-bf09-c9bd9ac460a7", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19182026-01-14T21:22:46.701ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
19192026-01-14T21:22:46.703ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6e7d76b3-5844-4bea-b59b-dde7bcf78e19", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19202026-01-14T21:22:46.703ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
19212026-01-14T21:22:46.704ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "35ce774c-51eb-4812-8e25-fd1c255238a2", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19222026-01-14T21:22:46.704ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet
19232026-01-14T21:22:46.704ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19242026-01-14T21:22:46.704ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
19252026-01-14T21:22:46.704ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19262026-01-14T21:22:46.705ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
19272026-01-14T21:22:46.737ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19282026-01-14T21:22:46.742ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet result = Ok(())
19292026-01-14T21:22:46.743ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet
19302026-01-14T21:22:46.743ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19312026-01-14T21:22:46.743ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
19322026-01-14T21:22:46.743ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19332026-01-14T21:22:46.743ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
19342026-01-14T21:22:46.752ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19352026-01-14T21:22:46.758ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet result = Ok(())
19362026-01-14T21:22:46.758ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
19372026-01-14T21:22:46.758ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19382026-01-14T21:22:46.759ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
19392026-01-14T21:22:46.876ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:60096
19402026-01-14T21:22:46.883ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = http://[::1]:60096 background_task = inventory_collection body = None method = GET uri = http://[::1]:60096/inventory
19412026-01-14T21:22:46.890ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:49957 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
19422026-01-14T21:22:46.890ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = GET remote_addr = [::1]:49957 req_id = a64d7077-36b0-4cf9-8c92-48da5399b212 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
19432026-01-14T21:22:46.891ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = GET remote_addr = [::1]:49957 req_id = a64d7077-36b0-4cf9-8c92-48da5399b212 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory version = 12.0.0
19442026-01-14T21:22:46.922ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 35983 local_addr = [::1]:60096 method = GET remote_addr = [::1]:49957 req_id = a64d7077-36b0-4cf9-8c92-48da5399b212 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
19452026-01-14T21:22:46.927ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = http://[::1]:60096 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:60096/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "a64d7077-36b0-4cf9-8c92-48da5399b212", "content-length": "20208", "date": "Wed, 14 Jan 2026 21:22:46 GMT"} })
19462026-01-14T21:22:46.949ZDEBGtest_vpc_firewall (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
19472026-01-14T21:22:46.949ZDEBGtest_vpc_firewall (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
19482026-01-14T21:22:46.949ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from CockroachDB nodes background_task = inventory_collection
19492026-01-14T21:22:46.950ZDEBGtest_vpc_firewall (CockroachClusterAdminClient): client request body = None method = GET uri = http://[::1]:32222/node/id
19502026-01-14T21:22:46.950ZDEBGtest_vpc_firewall (CockroachClusterAdminClient): client response result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
19512026-01-14T21:22:46.951ZWARNtest_vpc_firewall (CockroachClusterAdminClient): Failed to fetch metrics from CockroachDB node error = Failed to get node ID from [::1]:32222
19522026-01-14T21:22:47.131ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from NTP admin (timesync) background_task = inventory_collection sled_agent_url = http://[::1]:10123 zone_id = 541d5209-e75f-4f24-a362-01ff39fdfcab (omicron_zone)
19532026-01-14T21:22:47.131ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None method = GET ntp_admin_url = http://[::1]:10123 uri = http://[::1]:10123/timesync
19542026-01-14T21:22:47.132ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection ntp_admin_url = http://[::1]:10123 result = Err(reqwest::Error { kind: Request, url: "http://[::1]:10123/timesync", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:10123, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
19552026-01-14T21:22:47.134ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from internal DNS servers background_task = inventory_collection
19562026-01-14T21:22:47.309ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from DNS server background_task = inventory_collection zone_id = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b (omicron_zone)
19572026-01-14T21:22:47.309ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None internal_dns_url = http://[::1]:43592 method = GET uri = http://[::1]:43592/config
19582026-01-14T21:22:47.311ZINFOtest_vpc_firewall (http): accepted connection kind = dns local_addr = [::1]:43592 remote_addr = [::1]:36946
19592026-01-14T21:22:47.313ZINFOtest_vpc_firewall (InternalApi): inserted blueprint blueprint_id = 262c300c-11e4-479f-abb4-29db6faa14be
19602026-01-14T21:22:47.313ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig
19612026-01-14T21:22:47.313ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19622026-01-14T21:22:47.313ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
19632026-01-14T21:22:47.313ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
19642026-01-14T21:22:47.314ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
19652026-01-14T21:22:47.315ZTRACtest_vpc_firewall (http): incoming request kind = dns local_addr = [::1]:43592 method = GET remote_addr = [::1]:36946 req_id = 7d5808ab-928a-4f9d-a2ac-2d10a65cc56c uri = /config
19662026-01-14T21:22:47.315ZDEBGtest_vpc_firewall (http): determined request API version kind = dns local_addr = [::1]:43592 method = GET remote_addr = [::1]:36946 req_id = 7d5808ab-928a-4f9d-a2ac-2d10a65cc56c uri = /config version = 2.0.0
19672026-01-14T21:22:47.318ZINFOtest_vpc_firewall (http): request completed kind = dns latency_us = 2258 local_addr = [::1]:43592 method = GET remote_addr = [::1]:36946 req_id = 7d5808ab-928a-4f9d-a2ac-2d10a65cc56c response_code = 200 uri = /config
19682026-01-14T21:22:47.319ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection internal_dns_url = http://[::1]:43592 result = Ok(Response { url: "http://[::1]:43592/config", status: 200, headers: {"content-type": "application/json", "x-request-id": "7d5808ab-928a-4f9d-a2ac-2d10a65cc56c", "content-length": "3478", "date": "Wed, 14 Jan 2026 21:22:47 GMT"} })
19692026-01-14T21:22:47.321ZDEBGtest_vpc_firewall (BackgroundTasks): finished collection from DNS server background_task = inventory_collection zone_id = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b (omicron_zone)
19702026-01-14T21:22:47.321ZDEBGtest_vpc_firewall (BackgroundTasks): finished collection from internal DNS servers background_task = inventory_collection
19712026-01-14T21:22:47.321ZDEBGtest_vpc_firewall (BackgroundTasks): finished collection background_task = inventory_collection
19722026-01-14T21:22:47.324ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
19732026-01-14T21:22:47.324ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19742026-01-14T21:22:47.324ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
19752026-01-14T21:22:47.324ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19762026-01-14T21:22:47.325ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
19772026-01-14T21:22:47.329ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19782026-01-14T21:22:47.347ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = BlueprintConfig result = Ok(())
19792026-01-14T21:22:47.348ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
19802026-01-14T21:22:47.357ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
19812026-01-14T21:22:47.358ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
19822026-01-14T21:22:47.358ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
19832026-01-14T21:22:47.359ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
19842026-01-14T21:22:47.383ZINFOtest_vpc_firewall (InternalApi): No networking records needed for crucible_pantry service
19852026-01-14T21:22:47.383ZINFOtest_vpc_firewall (InternalApi): No networking records needed for internal_dns service
19862026-01-14T21:22:47.383ZINFOtest_vpc_firewall (InternalApi): No networking records needed for clickhouse service
19872026-01-14T21:22:47.383ZINFOtest_vpc_firewall (InternalApi): No networking records needed for cockroach_db service
19882026-01-14T21:22:47.489ZINFOtest_vpc_firewall (InternalApi): Inserted networking records for boundary_ntp service
19892026-01-14T21:22:47.565ZINFOtest_vpc_firewall (InternalApi): Inserted networking records for external_dns service
19902026-01-14T21:22:47.594ZINFOtest_vpc_firewall (InternalApi): Inserted networking records for nexus service
19912026-01-14T21:22:47.594ZINFOtest_vpc_firewall (InternalApi): Inserted service networking records
19922026-01-14T21:22:47.594ZINFOtest_vpc_firewall (InternalApi): Inserted physical disks
19932026-01-14T21:22:47.594ZINFOtest_vpc_firewall (InternalApi): Inserted zpools
19942026-01-14T21:22:47.594ZINFOtest_vpc_firewall (InternalApi): Inserted datasets
19952026-01-14T21:22:47.622ZINFOtest_vpc_firewall (InternalApi): Populated DNS tables for internal DNS
19962026-01-14T21:22:47.633ZINFOtest_vpc_firewall (InternalApi): Populated DNS tables for external DNS
19972026-01-14T21:22:47.635ZTRACtest_vpc_firewall (InternalApi): authorize begin action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
19982026-01-14T21:22:47.635ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
19992026-01-14T21:22:47.635ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20002026-01-14T21:22:47.635ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20012026-01-14T21:22:47.636ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20022026-01-14T21:22:47.656ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20032026-01-14T21:22:47.660ZDEBGtest_vpc_firewall (InternalApi): authorize result action = CreateChild actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
20042026-01-14T21:22:47.660ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
20052026-01-14T21:22:47.661ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20062026-01-14T21:22:47.661ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20072026-01-14T21:22:47.661ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20082026-01-14T21:22:47.661ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20092026-01-14T21:22:47.680ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20102026-01-14T21:22:47.686ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
20112026-01-14T21:22:47.723ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig
20122026-01-14T21:22:47.723ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20132026-01-14T21:22:47.723ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20142026-01-14T21:22:47.723ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20152026-01-14T21:22:47.724ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20162026-01-14T21:22:47.740ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20172026-01-14T21:22:47.750ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig result = Ok(())
20182026-01-14T21:22:47.750ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig
20192026-01-14T21:22:47.750ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20202026-01-14T21:22:47.750ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20212026-01-14T21:22:47.750ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20222026-01-14T21:22:47.751ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20232026-01-14T21:22:47.758ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20242026-01-14T21:22:47.801ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig result = Ok(())
20252026-01-14T21:22:47.810ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig
20262026-01-14T21:22:47.810ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20272026-01-14T21:22:47.810ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20282026-01-14T21:22:47.810ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20292026-01-14T21:22:47.811ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20302026-01-14T21:22:47.819ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20312026-01-14T21:22:47.830ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = DnsConfig result = Ok(())
20322026-01-14T21:22:47.849ZINFOtest_vpc_firewall (InternalApi): Created recovery silo
20332026-01-14T21:22:47.851ZINFOtest_vpc_firewall (InternalApi): Created recovery user
20342026-01-14T21:22:47.860ZINFOtest_vpc_firewall (InternalApi): Created recovery user's password
20352026-01-14T21:22:47.860ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, lookup_type: ById(0fe085d5-9aed-4ef7-a296-b30db2a9c70a) }
20362026-01-14T21:22:47.860ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 0fe085d5-9aed-4ef7-a296-b30db2a9c70a resource_type = Silo
20372026-01-14T21:22:47.860ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20382026-01-14T21:22:47.860ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20392026-01-14T21:22:47.861ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20402026-01-14T21:22:47.865ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20412026-01-14T21:22:47.865ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20422026-01-14T21:22:47.865ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20432026-01-14T21:22:47.866ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20442026-01-14T21:22:47.873ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20452026-01-14T21:22:47.878ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ModifyPolicy actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, lookup_type: ById(0fe085d5-9aed-4ef7-a296-b30db2a9c70a) } result = Ok(())
20462026-01-14T21:22:47.878ZDEBGtest_vpc_firewall (InternalApi): Generated role assignment queries
20472026-01-14T21:22:47.883ZINFOtest_vpc_firewall (InternalApi): Granted Silo privileges
20482026-01-14T21:22:47.883ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
20492026-01-14T21:22:47.883ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20502026-01-14T21:22:47.883ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20512026-01-14T21:22:47.884ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20522026-01-14T21:22:47.885ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20532026-01-14T21:22:47.892ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20542026-01-14T21:22:47.898ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
20552026-01-14T21:22:47.919ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20562026-01-14T21:22:47.919ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20572026-01-14T21:22:47.921ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20582026-01-14T21:22:47.928ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20592026-01-14T21:22:47.928ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20602026-01-14T21:22:47.929ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20612026-01-14T21:22:47.934ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20622026-01-14T21:22:47.934ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20632026-01-14T21:22:47.935ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20642026-01-14T21:22:47.939ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
20652026-01-14T21:22:47.939ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
20662026-01-14T21:22:47.939ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20672026-01-14T21:22:47.939ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20682026-01-14T21:22:47.940ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20692026-01-14T21:22:47.955ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20702026-01-14T21:22:47.955ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20712026-01-14T21:22:47.955ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20722026-01-14T21:22:47.956ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20732026-01-14T21:22:47.961ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20742026-01-14T21:22:47.961ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20752026-01-14T21:22:47.961ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20762026-01-14T21:22:47.972ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20772026-01-14T21:22:47.984ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20782026-01-14T21:22:48.003ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
20792026-01-14T21:22:48.003ZTRACtest_vpc_firewall (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
20802026-01-14T21:22:48.003ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
20812026-01-14T21:22:48.003ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
20822026-01-14T21:22:48.003ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20832026-01-14T21:22:48.003ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20842026-01-14T21:22:48.004ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20852026-01-14T21:22:48.009ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
20862026-01-14T21:22:48.009ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20872026-01-14T21:22:48.009ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20882026-01-14T21:22:48.010ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20892026-01-14T21:22:48.018ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
20902026-01-14T21:22:48.018ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20912026-01-14T21:22:48.018ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20922026-01-14T21:22:48.019ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20932026-01-14T21:22:48.025ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
20942026-01-14T21:22:48.038ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
20952026-01-14T21:22:48.038ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20962026-01-14T21:22:48.038ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
20972026-01-14T21:22:48.038ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
20982026-01-14T21:22:48.045ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
20992026-01-14T21:22:48.045ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21002026-01-14T21:22:48.047ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21012026-01-14T21:22:48.066ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21022026-01-14T21:22:48.067ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21032026-01-14T21:22:48.068ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21042026-01-14T21:22:48.073ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21052026-01-14T21:22:48.073ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21062026-01-14T21:22:48.074ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21072026-01-14T21:22:48.081ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
21082026-01-14T21:22:48.081ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21092026-01-14T21:22:48.081ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21102026-01-14T21:22:48.081ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21112026-01-14T21:22:48.082ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21122026-01-14T21:22:48.088ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21132026-01-14T21:22:48.088ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21142026-01-14T21:22:48.088ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21152026-01-14T21:22:48.091ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21162026-01-14T21:22:48.097ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21172026-01-14T21:22:48.097ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21182026-01-14T21:22:48.097ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21192026-01-14T21:22:48.099ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21202026-01-14T21:22:48.105ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21212026-01-14T21:22:48.118ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
21222026-01-14T21:22:48.118ZTRACtest_vpc_firewall (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
21232026-01-14T21:22:48.118ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21242026-01-14T21:22:48.118ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21252026-01-14T21:22:48.118ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21262026-01-14T21:22:48.125ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21272026-01-14T21:22:48.125ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21282026-01-14T21:22:48.126ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21292026-01-14T21:22:48.131ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21302026-01-14T21:22:48.132ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21312026-01-14T21:22:48.133ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21322026-01-14T21:22:48.138ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21332026-01-14T21:22:48.138ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21342026-01-14T21:22:48.139ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21352026-01-14T21:22:48.145ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
21362026-01-14T21:22:48.145ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21372026-01-14T21:22:48.145ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21382026-01-14T21:22:48.145ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21392026-01-14T21:22:48.147ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21402026-01-14T21:22:48.153ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21412026-01-14T21:22:48.153ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21422026-01-14T21:22:48.153ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21432026-01-14T21:22:48.154ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21442026-01-14T21:22:48.158ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21452026-01-14T21:22:48.158ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21462026-01-14T21:22:48.159ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21472026-01-14T21:22:48.160ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21482026-01-14T21:22:48.166ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21492026-01-14T21:22:48.179ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
21502026-01-14T21:22:48.179ZTRACtest_vpc_firewall (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
21512026-01-14T21:22:48.179ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
21522026-01-14T21:22:48.179ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21532026-01-14T21:22:48.179ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21542026-01-14T21:22:48.179ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21552026-01-14T21:22:48.181ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21562026-01-14T21:22:48.186ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21572026-01-14T21:22:48.186ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21582026-01-14T21:22:48.186ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21592026-01-14T21:22:48.187ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21602026-01-14T21:22:48.193ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21612026-01-14T21:22:48.194ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21622026-01-14T21:22:48.194ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21632026-01-14T21:22:48.194ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21642026-01-14T21:22:48.198ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21652026-01-14T21:22:48.215ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
21662026-01-14T21:22:48.215ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21672026-01-14T21:22:48.215ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21682026-01-14T21:22:48.216ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21692026-01-14T21:22:48.226ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21702026-01-14T21:22:48.226ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21712026-01-14T21:22:48.227ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21722026-01-14T21:22:48.231ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21732026-01-14T21:22:48.231ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21742026-01-14T21:22:48.232ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21752026-01-14T21:22:48.236ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21762026-01-14T21:22:48.237ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21772026-01-14T21:22:48.256ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21782026-01-14T21:22:48.263ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21792026-01-14T21:22:48.263ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21802026-01-14T21:22:48.264ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21812026-01-14T21:22:48.270ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
21822026-01-14T21:22:48.270ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21832026-01-14T21:22:48.270ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21842026-01-14T21:22:48.270ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21852026-01-14T21:22:48.271ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21862026-01-14T21:22:48.277ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
21872026-01-14T21:22:48.278ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21882026-01-14T21:22:48.278ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21892026-01-14T21:22:48.279ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21902026-01-14T21:22:48.298ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
21912026-01-14T21:22:48.299ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
21922026-01-14T21:22:48.299ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
21932026-01-14T21:22:48.301ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
21942026-01-14T21:22:48.306ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
21952026-01-14T21:22:48.325ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
21962026-01-14T21:22:48.325ZTRACtest_vpc_firewall (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
21972026-01-14T21:22:48.325ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
21982026-01-14T21:22:48.325ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
21992026-01-14T21:22:48.326ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
22002026-01-14T21:22:48.326ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
22012026-01-14T21:22:48.327ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
22022026-01-14T21:22:48.350ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
22032026-01-14T21:22:48.350ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
22042026-01-14T21:22:48.350ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
22052026-01-14T21:22:48.351ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
22062026-01-14T21:22:48.354ZINFOtest_vpc_firewall (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 0d2e7770-becb-406e-bb80-957852840966
22072026-01-14T21:22:48.354ZDEBGtest_vpc_firewall (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 0d2e7770-becb-406e-bb80-957852840966 time_started = 2026-01-14 21:22:44.402172 UTC
22082026-01-14T21:22:48.354ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 8.211939701s iteration = 2 status = {"collection_id":"0d2e7770-becb-406e-bb80-957852840966","time_done":"2026-01-14 21:22:47.321978 UTC","time_started":"2026-01-14 21:22:44.402172 UTC"}
22092026-01-14T21:22:48.354ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = inventory_loader iteration = 2 reason = Dependency
22102026-01-14T21:22:48.354ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory
22112026-01-14T21:22:48.355ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22122026-01-14T21:22:48.355ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
22132026-01-14T21:22:48.355ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
22142026-01-14T21:22:48.356ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
22152026-01-14T21:22:48.357ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = multicast_reconciler iteration = 2 reason = Dependency
22162026-01-14T21:22:48.357ZTRACtest_vpc_firewall (BackgroundTasks): multicast group reconciler activating background_task = multicast_reconciler
22172026-01-14T21:22:48.357ZTRACtest_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass background_task = multicast_reconciler
22182026-01-14T21:22:48.357ZINFOtest_vpc_firewall (BackgroundTasks): invalidating multicast caches due to topology change background_task = multicast_reconciler
22192026-01-14T21:22:48.357ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
22202026-01-14T21:22:48.359ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: dd c4 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 ............._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:22258 req_id = 8134f77c-2e78-4177-986b-3478cf463d43
22212026-01-14T21:22:48.361ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 56772,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:22258 req_id = 8134f77c-2e78-4177-986b-3478cf463d43
22222026-01-14T21:22:48.361ZDEBGtest_vpc_firewall (store): query key key = _dendrite._tcp
22232026-01-14T21:22:48.362ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
22242026-01-14T21:22:48.362ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:22258 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 8134f77c-2e78-4177-986b-3478cf463d43
22252026-01-14T21:22:48.371ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10491, tv_nsec: 757918403 } })
22262026-01-14T21:22:48.371ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
22272026-01-14T21:22:48.375ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22282026-01-14T21:22:48.388ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory result = Ok(())
22292026-01-14T21:22:48.388ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
22302026-01-14T21:22:48.388ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
22312026-01-14T21:22:48.389ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
22322026-01-14T21:22:48.390ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22332026-01-14T21:22:48.390ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
22342026-01-14T21:22:48.390ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
22352026-01-14T21:22:48.391ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
22362026-01-14T21:22:48.395ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: bf e6 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:16202 req_id = c78a9a26-a2a8-45a0-848f-fa18ccce8380
22372026-01-14T21:22:48.396ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 49126,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:16202 req_id = c78a9a26-a2a8-45a0-848f-fa18ccce8380
22382026-01-14T21:22:48.397ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
22392026-01-14T21:22:48.398ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:16202 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = c78a9a26-a2a8-45a0-848f-fa18ccce8380
22402026-01-14T21:22:48.398ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
22412026-01-14T21:22:48.398ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
22422026-01-14T21:22:48.399ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
22432026-01-14T21:22:48.471ZTRACtest_vpc_firewall (DpdClient): client request background_task = multicast_reconciler body = None method = GET uri = http://[::1]:65194/switch/identifiers
22442026-01-14T21:22:48.472ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22452026-01-14T21:22:48.489ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
22462026-01-14T21:22:48.489ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
22472026-01-14T21:22:48.489ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
22482026-01-14T21:22:48.492ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
22492026-01-14T21:22:48.494ZTRACtest_vpc_firewall (DpdClient): client response background_task = multicast_reconciler result = Ok(Response { url: "http://[::1]:65194/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "6dc2fe37-fcb8-4bb1-b261-52a7587b16dc", "content-length": "206", "date": "Wed, 14 Jan 2026 21:22:48 GMT"} })
22502026-01-14T21:22:48.494ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Creating
22512026-01-14T21:22:48.497ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
22522026-01-14T21:22:48.497ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
22532026-01-14T21:22:48.498ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
22542026-01-14T21:22:48.541ZDEBGtest_vpc_firewall (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("nexus"): [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], Name("external-dns"): [NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }]} subnet_networks = {Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })], Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })]} vpc_interfaces = {}
22552026-01-14T21:22:48.541ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
22562026-01-14T21:22:48.541ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22572026-01-14T21:22:48.541ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
22582026-01-14T21:22:48.541ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
22592026-01-14T21:22:48.542ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
22602026-01-14T21:22:48.551ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
22612026-01-14T21:22:48.564ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
22622026-01-14T21:22:48.564ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
22632026-01-14T21:22:48.564ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
22642026-01-14T21:22:48.566ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
22652026-01-14T21:22:48.571ZTRACtest_vpc_firewall (nexus): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-14T19:25:04.038956Z, time_modified: 2026-01-14T21:22:47.898693Z, allowed_ips: None }
22662026-01-14T21:22:48.572ZDEBGtest_vpc_firewall (nexus): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
22672026-01-14T21:22:48.572ZDEBGtest_vpc_firewall (nexus): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
22682026-01-14T21:22:48.572ZDEBGtest_vpc_firewall (nexus): resolved 3 rules for sleds
22692026-01-14T21:22:48.618ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Creating
22702026-01-14T21:22:48.619ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Deleting
22712026-01-14T21:22:48.619ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
22722026-01-14T21:22:48.619ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
22732026-01-14T21:22:48.620ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
22742026-01-14T21:22:48.716ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Deleting
22752026-01-14T21:22:48.716ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Active
22762026-01-14T21:22:48.716ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
22772026-01-14T21:22:48.716ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
22782026-01-14T21:22:48.717ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
22792026-01-14T21:22:48.722ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Active
22802026-01-14T21:22:48.722ZTRACtest_vpc_firewall (BackgroundTasks): reconciling member state changes background_task = multicast_reconciler
22812026-01-14T21:22:48.722ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
22822026-01-14T21:22:48.722ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
22832026-01-14T21:22:48.724ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
22842026-01-14T21:22:48.734ZDEBGtest_vpc_firewall (nexus): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-01-14T21:22:38.887398Z, time_modified: 2026-01-14T21:22:38.887398Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(60096), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(52160), cpu_family: AmdMilan }]
22852026-01-14T21:22:48.734ZDEBGtest_vpc_firewall (nexus): sending firewall rules to sled agents
22862026-01-14T21:22:48.796ZTRACtest_vpc_firewall (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Database
22872026-01-14T21:22:48.796ZDEBGtest_vpc_firewall (InstanceAllocator): roles roles = RoleSet { roles: {} }
22882026-01-14T21:22:48.798ZDEBGtest_vpc_firewall (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Database result = Ok(())
22892026-01-14T21:22:48.801ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
22902026-01-14T21:22:48.801ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
22912026-01-14T21:22:48.802ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
22922026-01-14T21:22:48.809ZTRACtest_vpc_firewall (InstanceAllocator): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
22932026-01-14T21:22:48.809ZTRACtest_vpc_firewall (InstanceAllocator): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
22942026-01-14T21:22:48.809ZTRACtest_vpc_firewall (InstanceAllocator): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Database
22952026-01-14T21:22:48.809ZDEBGtest_vpc_firewall (InstanceAllocator): roles roles = RoleSet { roles: {} }
22962026-01-14T21:22:48.810ZDEBGtest_vpc_firewall (InstanceAllocator): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Database result = Ok(())
22972026-01-14T21:22:48.815ZDEBGtest_vpc_firewall (InstanceAllocator): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "viewer")} }
22982026-01-14T21:22:48.822ZDEBGtest_vpc_firewall (InstanceAllocator): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000004ead (built_in_user), .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
22992026-01-14T21:22:48.823ZDEBGtest_vpc_firewall (nexus): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:60096/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23002026-01-14T21:22:48.824ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:64288 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
23012026-01-14T21:22:48.825ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = PUT remote_addr = [::1]:64288 req_id = f2eb860c-c6c3-499b-abd4-859f9ca37e39 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23022026-01-14T21:22:48.825ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = PUT remote_addr = [::1]:64288 req_id = f2eb860c-c6c3-499b-abd4-859f9ca37e39 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules version = 12.0.0
23032026-01-14T21:22:48.827ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2441 local_addr = [::1]:60096 method = PUT remote_addr = [::1]:64288 req_id = f2eb860c-c6c3-499b-abd4-859f9ca37e39 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
23042026-01-14T21:22:48.828ZDEBGtest_vpc_firewall (nexus): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:60096/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "f2eb860c-c6c3-499b-abd4-859f9ca37e39", "date": "Wed, 14 Jan 2026 21:22:48 GMT"} })
23052026-01-14T21:22:48.837ZINFOtest_vpc_firewall (nexus): updated firewall rules on 1 sleds
23062026-01-14T21:22:48.837ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_config_internal dns_group = internal iteration = 2 reason = Signaled
23072026-01-14T21:22:48.837ZDEBGtest_vpc_firewall (BackgroundTasks): reading DNS version background_task = dns_config_internal dns_group = internal
23082026-01-14T21:22:48.838ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
23092026-01-14T21:22:48.838ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
23102026-01-14T21:22:48.838ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
23112026-01-14T21:22:48.839ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_servers_internal dns_group = internal iteration = 2 reason = Signaled
23122026-01-14T21:22:48.839ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal
23132026-01-14T21:22:48.840ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_config_external dns_group = external iteration = 2 reason = Signaled
23142026-01-14T21:22:48.840ZDEBGtest_vpc_firewall (BackgroundTasks): reading DNS version background_task = dns_config_external dns_group = external
23152026-01-14T21:22:48.840ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
23162026-01-14T21:22:48.840ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
23172026-01-14T21:22:48.840ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
23182026-01-14T21:22:48.841ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_servers_external dns_group = external iteration = 2 reason = Signaled
23192026-01-14T21:22:48.841ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal
23202026-01-14T21:22:48.841ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = external_endpoints iteration = 2 reason = Signaled
23212026-01-14T21:22:48.841ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet
23222026-01-14T21:22:48.841ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23232026-01-14T21:22:48.841ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
23242026-01-14T21:22:48.842ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
23252026-01-14T21:22:48.842ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
23262026-01-14T21:22:48.843ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = inventory_collection iteration = 3 reason = Signaled
23272026-01-14T21:22:48.843ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
23282026-01-14T21:22:48.843ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23292026-01-14T21:22:48.843ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
23302026-01-14T21:22:48.843ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
23312026-01-14T21:22:48.843ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
23322026-01-14T21:22:48.844ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_loader iteration = 2 reason = Signaled
23332026-01-14T21:22:48.844ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig
23342026-01-14T21:22:48.844ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23352026-01-14T21:22:48.844ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
23362026-01-14T21:22:48.844ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
23372026-01-14T21:22:48.845ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
23382026-01-14T21:22:48.847ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 75 (0x4b) bytes\n0000: 06 55 01 00 00 01 00 00 00 00 00 01 0c 5f 6e 61 .U..........._na\n0010: 6d 65 73 65 72 76 69 63 65 04 5f 74 63 70 0d 63 meservice._tcp.c\n0020: 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 ontrol-plane.oxi\n0030: 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 de.internal..!..\n0040: 00 00 29 04 d0 00 00 00 00 00 00 ..)........ kind = dns peer_addr = [::1]:11870 req_id = b98fee7c-a72f-4396-a51c-1a0ee543e8f0
23392026-01-14T21:22:48.847ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 1621,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_nameservice._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_nameservice._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 12,\n 95,\n 110,\n 97,\n 109,\n 101,\n 115,\n 101,\n 114,\n 118,\n 105,\n 99,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:11870 req_id = b98fee7c-a72f-4396-a51c-1a0ee543e8f0
23402026-01-14T21:22:48.848ZDEBGtest_vpc_firewall (store): query key key = _nameservice._tcp
23412026-01-14T21:22:48.848ZDEBGtest_vpc_firewall (store): query key key = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host
23422026-01-14T21:22:48.848ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:11870 query = LowerQuery { name: LowerName(Name("_nameservice._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 43592, target: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal") }) }] req_id = b98fee7c-a72f-4396-a51c-1a0ee543e8f0
23432026-01-14T21:22:48.848ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 76 (0x4c) bytes\n0000: 9c c1 01 00 00 01 00 00 00 00 00 01 0d 5f 65 78 ............._ex\n0010: 74 65 72 6e 61 6c 2d 64 6e 73 04 5f 74 63 70 0d ternal-dns._tcp.\n0020: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0030: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 ide.internal..!.\n0040: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:47270 req_id = e6297e02-9460-44a8-ae71-0dd4f3f76931
23442026-01-14T21:22:48.848ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 40129,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_external-dns._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_external-dns._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 13,\n 95,\n 101,\n 120,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 45,\n 100,\n 110,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:47270 req_id = e6297e02-9460-44a8-ae71-0dd4f3f76931
23452026-01-14T21:22:48.848ZDEBGtest_vpc_firewall (store): query key key = _external-dns._tcp
23462026-01-14T21:22:48.848ZDEBGtest_vpc_firewall (store): query key key = 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host
23472026-01-14T21:22:48.848ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:47270 query = LowerQuery { name: LowerName(Name("_external-dns._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 41277, target: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal") }) }] req_id = e6297e02-9460-44a8-ae71-0dd4f3f76931
23482026-01-14T21:22:48.850ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _nameservice._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_nameservice._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_nameservice._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 43592, target: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 236218781 } })
23492026-01-14T21:22:48.850ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
23502026-01-14T21:22:48.850ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _external-dns._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_external-dns._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_external-dns._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 41277, target: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 237393783 } })
23512026-01-14T21:22:48.850ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
23522026-01-14T21:22:48.851ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 7e 52 01 00 00 01 00 00 00 00 00 01 24 30 64 30 ~R..........$0d0\n0010: 34 61 66 30 63 2d 35 63 31 30 2d 34 62 62 38 2d 4af0c-5c10-4bb8-\n0020: 61 31 66 34 2d 36 38 63 37 31 61 66 63 31 62 38 a1f4-68c71afc1b8\n0030: 62 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 b.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:12656 req_id = 21b55b95-a0e2-4bb4-b715-b797ccd57f22
23532026-01-14T21:22:48.851ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 32338,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 48,\n 100,\n 48,\n 52,\n 97,\n 102,\n 48,\n 99,\n 45,\n 53,\n 99,\n 49,\n 48,\n 45,\n 52,\n 98,\n 98,\n 56,\n 45,\n 97,\n 49,\n 102,\n 52,\n 45,\n 54,\n 56,\n 99,\n 55,\n 49,\n 97,\n 102,\n 99,\n 49,\n 98,\n 56,\n 98,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:12656 req_id = 21b55b95-a0e2-4bb4-b715-b797ccd57f22
23542026-01-14T21:22:48.851ZDEBGtest_vpc_firewall (store): query key key = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host
23552026-01-14T21:22:48.851ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:12656 query = LowerQuery { name: LowerName(Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal.")), original: Query { name: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 21b55b95-a0e2-4bb4-b715-b797ccd57f22
23562026-01-14T21:22:48.851ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: a3 2f 01 00 00 01 00 00 00 00 00 01 24 36 65 31 ./..........$6e1\n0010: 65 63 36 63 30 2d 34 39 32 31 2d 34 62 37 34 2d ec6c0-4921-4b74-\n0020: 62 38 65 66 2d 64 36 34 62 32 62 38 62 38 37 62 b8ef-d64b2b8b87b\n0030: 39 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 9.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:16558 req_id = d40169b5-add9-4919-84d6-bbd2c8f77e2b
23572026-01-14T21:22:48.851ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 41775,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 54,\n 101,\n 49,\n 101,\n 99,\n 54,\n 99,\n 48,\n 45,\n 52,\n 57,\n 50,\n 49,\n 45,\n 52,\n 98,\n 55,\n 52,\n 45,\n 98,\n 56,\n 101,\n 102,\n 45,\n 100,\n 54,\n 52,\n 98,\n 50,\n 98,\n 56,\n 98,\n 56,\n 55,\n 98,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:16558 req_id = d40169b5-add9-4919-84d6-bbd2c8f77e2b
23582026-01-14T21:22:48.851ZDEBGtest_vpc_firewall (store): query key key = 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host
23592026-01-14T21:22:48.851ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:16558 query = LowerQuery { name: LowerName(Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal.")), original: Query { name: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = d40169b5-add9-4919-84d6-bbd2c8f77e2b
23602026-01-14T21:22:48.852ZINFOtest_vpc_firewall (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:43592] } background_task = dns_servers_internal dns_group = internal
23612026-01-14T21:22:48.852ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_servers_internal dns_group = internal elapsed = 12.571576ms iteration = 2 status = {"addresses":["[::1]:43592"]}
23622026-01-14T21:22:48.852ZINFOtest_vpc_firewall (BackgroundTasks): found DNS servers (initial) addresses = DnsServersList { addresses: [[::1]:41277] } background_task = dns_servers_external dns_group = external
23632026-01-14T21:22:48.852ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_servers_external dns_group = external elapsed = 10.985936ms iteration = 2 status = {"addresses":["[::1]:41277"]}
23642026-01-14T21:22:48.852ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 2 reason = Dependency
23652026-01-14T21:22:48.852ZWARNtest_vpc_firewall (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_internal dns_group = internal reason = no config
23662026-01-14T21:22:48.852ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 29.548\u{b5}s iteration = 2 status = {"error":"no config"}
23672026-01-14T21:22:48.852ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 2 reason = Dependency
23682026-01-14T21:22:48.852ZWARNtest_vpc_firewall (BackgroundTasks): DNS propagation: skipped background_task = dns_propagation_external dns_group = external reason = no config
23692026-01-14T21:22:48.852ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 11.984\u{b5}s iteration = 2 status = {"error":"no config"}
23702026-01-14T21:22:48.857ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23712026-01-14T21:22:48.866ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet result = Ok(())
23722026-01-14T21:22:48.866ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
23732026-01-14T21:22:48.866ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
23742026-01-14T21:22:48.866ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
23752026-01-14T21:22:48.867ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
23762026-01-14T21:22:48.868ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23772026-01-14T21:22:48.868ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
23782026-01-14T21:22:48.868ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
23792026-01-14T21:22:48.869ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
23802026-01-14T21:22:48.870ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
23812026-01-14T21:22:48.870ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
23822026-01-14T21:22:48.870ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
23832026-01-14T21:22:48.870ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
23842026-01-14T21:22:48.870ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
23852026-01-14T21:22:48.875ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23862026-01-14T21:22:48.881ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
23872026-01-14T21:22:48.881ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
23882026-01-14T21:22:48.881ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
23892026-01-14T21:22:48.884ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
23902026-01-14T21:22:48.888ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
23912026-01-14T21:22:48.896ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = BlueprintConfig result = Ok(())
23922026-01-14T21:22:48.896ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
23932026-01-14T21:22:48.896ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
23942026-01-14T21:22:48.896ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
23952026-01-14T21:22:48.899ZDEBGtest_vpc_firewall (BackgroundTasks): found groups for member reconciliation background_task = multicast_reconciler total_groups = 0
23962026-01-14T21:22:48.900ZDEBGtest_vpc_firewall (BackgroundTasks): member state reconciliation completed background_task = multicast_reconciler members_processed = 0
23972026-01-14T21:22:48.900ZTRACtest_vpc_firewall (BackgroundTasks): cleaning up deleted multicast members background_task = multicast_reconciler
23982026-01-14T21:22:48.900ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
23992026-01-14T21:22:48.900ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
24002026-01-14T21:22:48.901ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
24012026-01-14T21:22:48.902ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24022026-01-14T21:22:48.914ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
24032026-01-14T21:22:48.915ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24042026-01-14T21:22:48.937ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
24052026-01-14T21:22:48.943ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig
24062026-01-14T21:22:48.944ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24072026-01-14T21:22:48.944ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
24082026-01-14T21:22:48.945ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
24092026-01-14T21:22:48.948ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
24102026-01-14T21:22:48.977ZDEBGtest_vpc_firewall (BackgroundTasks): inventory_prune_one: nothing eligible for removal (too few) background_task = inventory_collection candidates = [(0d2e7770-becb-406e-bb80-957852840966, 2)]
24112026-01-14T21:22:48.977ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal
24122026-01-14T21:22:48.988ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Blueprint { parent: Fleet, key: 262c300c-11e4-479f-abb4-29db6faa14be, lookup_type: ById(262c300c-11e4-479f-abb4-29db6faa14be) }
24132026-01-14T21:22:48.988ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24142026-01-14T21:22:48.988ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
24152026-01-14T21:22:48.988ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
24162026-01-14T21:22:48.989ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
24172026-01-14T21:22:48.991ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 3 reason = Timeout
24182026-01-14T21:22:48.991ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig
24192026-01-14T21:22:48.991ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = reconfigurator_config_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24202026-01-14T21:22:48.991ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
24212026-01-14T21:22:48.991ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
24222026-01-14T21:22:48.992ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
24232026-01-14T21:22:48.994ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 67 (0x43) bytes\n0000: 77 4f 01 00 00 01 00 00 00 00 00 01 04 5f 6d 67 wO..........._mg\n0010: 73 04 5f 74 63 70 0d 63 6f 6e 74 72 6f 6c 2d 70 s._tcp.control-p\n0020: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0030: 6e 61 6c 00 00 21 00 01 00 00 29 04 d0 00 00 00 nal..!....).....\n0040: 00 00 00 ... kind = dns peer_addr = [::1]:15865 req_id = 03b62dee-6b77-4e52-a137-2e115d2816bf
24242026-01-14T21:22:48.994ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 30543,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_mgs._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_mgs._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 4,\n 95,\n 109,\n 103,\n 115,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:15865 req_id = 03b62dee-6b77-4e52-a137-2e115d2816bf
24252026-01-14T21:22:48.994ZDEBGtest_vpc_firewall (store): query key key = _mgs._tcp
24262026-01-14T21:22:48.994ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
24272026-01-14T21:22:48.995ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:15865 query = LowerQuery { name: LowerName(Name("_mgs._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 03b62dee-6b77-4e52-a137-2e115d2816bf
24282026-01-14T21:22:48.995ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _mgs._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_mgs._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_mgs._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 59250, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 382538438 } })
24292026-01-14T21:22:48.996ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
24302026-01-14T21:22:48.997ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 30 94 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e 0...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:59419 req_id = ac1ee11b-b788-491c-b137-8d046025db20
24312026-01-14T21:22:48.997ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 12436,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:59419 req_id = ac1ee11b-b788-491c-b137-8d046025db20
24322026-01-14T21:22:48.997ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
24332026-01-14T21:22:48.997ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:59419 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = ac1ee11b-b788-491c-b137-8d046025db20
24342026-01-14T21:22:49.096ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _clickhouse-admin-keeper._tcp.control-plane.oxide.internal
24352026-01-14T21:22:49.097ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24362026-01-14T21:22:49.109ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = DnsConfig result = Ok(())
24372026-01-14T21:22:49.110ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
24382026-01-14T21:22:49.110ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
24392026-01-14T21:22:49.111ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
24402026-01-14T21:22:49.113ZDEBGtest_vpc_firewall (BackgroundTasks): found DNS version background_task = dns_config_internal dns_group = internal version = 1
24412026-01-14T21:22:49.114ZDEBGtest_vpc_firewall (BackgroundTasks): reading DNS config background_task = dns_config_internal dns_group = internal
24422026-01-14T21:22:49.114ZDEBGtest_vpc_firewall (BackgroundTasks): reading DNS zones background_task = dns_config_internal dns_group = internal
24432026-01-14T21:22:49.114ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
24442026-01-14T21:22:49.114ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24452026-01-14T21:22:49.114ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
24462026-01-14T21:22:49.114ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
24472026-01-14T21:22:49.114ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
24482026-01-14T21:22:49.115ZDEBGtest_vpc_firewall (BackgroundTasks): found DNS version background_task = dns_config_external dns_group = external version = 2
24492026-01-14T21:22:49.116ZDEBGtest_vpc_firewall (BackgroundTasks): reading DNS config background_task = dns_config_external dns_group = external
24502026-01-14T21:22:49.116ZDEBGtest_vpc_firewall (BackgroundTasks): reading DNS zones background_task = dns_config_external dns_group = external
24512026-01-14T21:22:49.116ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
24522026-01-14T21:22:49.116ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24532026-01-14T21:22:49.116ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
24542026-01-14T21:22:49.116ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
24552026-01-14T21:22:49.116ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
24562026-01-14T21:22:49.119ZDEBGtest_vpc_firewall (BackgroundTasks): multicast group member complete deletion finished background_task = multicast_reconciler left_and_time_deleted_members_deleted = 0
24572026-01-14T21:22:49.119ZTRACtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation cycle completed active_groups_verified = 0 background_task = multicast_reconciler error_count = 0 external_groups_created = 0 external_groups_deleted = 0 member_lifecycle_transitions = 0 orphaned_member_cleanup = 0 total_dpd_operations = 0
24582026-01-14T21:22:49.122ZTRACtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent background_task = multicast_reconciler
24592026-01-14T21:22:49.122ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 765.34793ms iteration = 2 status = {"disabled":false,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
24602026-01-14T21:22:49.123ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24612026-01-14T21:22:49.137ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Blueprint { parent: Fleet, key: 262c300c-11e4-479f-abb4-29db6faa14be, lookup_type: ById(262c300c-11e4-479f-abb4-29db6faa14be) } result = Ok(())
24622026-01-14T21:22:49.137ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database
24632026-01-14T21:22:49.137ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_loader roles = RoleSet { roles: {} }
24642026-01-14T21:22:49.138ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_loader resource = Database result = Ok(())
24652026-01-14T21:22:49.140ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24662026-01-14T21:22:49.152ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
24672026-01-14T21:22:49.152ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
24682026-01-14T21:22:49.152ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
24692026-01-14T21:22:49.152ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
24702026-01-14T21:22:49.154ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = inventory_loader elapsed = 799.522902ms iteration = 2 status = {"Loaded":{"collection_id":"0d2e7770-becb-406e-bb80-957852840966","time_loaded":"2026-01-14T21:22:48.354867158Z","time_started":"2026-01-14T21:22:44.402172Z"}}
24712026-01-14T21:22:49.154ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 2 reason = Dependency
24722026-01-14T21:22:49.154ZWARNtest_vpc_firewall (BackgroundTasks): Blueprint rendezvous: skipped background_task = blueprint_rendezvous reason = no blueprint
24732026-01-14T21:22:49.155ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 41.311\u{b5}s iteration = 2 status = {"error":"no blueprint"}
24742026-01-14T21:22:49.155ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = multicast_reconciler iteration = 3 reason = Dependency
24752026-01-14T21:22:49.155ZTRACtest_vpc_firewall (BackgroundTasks): multicast group reconciler activating background_task = multicast_reconciler
24762026-01-14T21:22:49.155ZTRACtest_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass background_task = multicast_reconciler
24772026-01-14T21:22:49.155ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
24782026-01-14T21:22:49.155ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 2 reason = Dependency
24792026-01-14T21:22:49.155ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 31.221\u{b5}s iteration = 2 status = {"error":"task disabled"}
24802026-01-14T21:22:49.155ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_planner iteration = 3 reason = Dependency
24812026-01-14T21:22:49.155ZDEBGtest_vpc_firewall (BackgroundTasks): blueprint planning disabled, doing nothing background_task = blueprint_planner
24822026-01-14T21:22:49.155ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 23.937\u{b5}s iteration = 3 status = "Disabled"
24832026-01-14T21:22:49.158ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet
24842026-01-14T21:22:49.158ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = external_endpoints resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
24852026-01-14T21:22:49.158ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
24862026-01-14T21:22:49.158ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
24872026-01-14T21:22:49.159ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
24882026-01-14T21:22:49.162ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24892026-01-14T21:22:49.173ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
24902026-01-14T21:22:49.173ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
24912026-01-14T21:22:49.173ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
24922026-01-14T21:22:49.174ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
24932026-01-14T21:22:49.185ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
24942026-01-14T21:22:49.193ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
24952026-01-14T21:22:49.193ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
24962026-01-14T21:22:49.193ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
24972026-01-14T21:22:49.195ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
24982026-01-14T21:22:49.199ZDEBGtest_vpc_firewall (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-14T21:22:37.508570Z })
24992026-01-14T21:22:49.199ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 208.480083ms iteration = 3 status = {"config_updated":false}
25002026-01-14T21:22:49.202ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
25012026-01-14T21:22:49.209ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Fleet result = Ok(())
25022026-01-14T21:22:49.209ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database
25032026-01-14T21:22:49.209ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = external_endpoints roles = RoleSet { roles: {} }
25042026-01-14T21:22:49.210ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = external_endpoints resource = Database result = Ok(())
25052026-01-14T21:22:49.212ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 87 (0x57) bytes\n0000: 59 5f 01 00 00 01 00 00 00 00 00 01 18 5f 63 6c Y_..........._cl\n0010: 69 63 6b 68 6f 75 73 65 2d 61 64 6d 69 6e 2d 6b ickhouse-admin-k\n0020: 65 65 70 65 72 04 5f 74 63 70 0d 63 6f 6e 74 72 eeper._tcp.contr\n0030: 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 69 ol-plane.oxide.i\n0040: 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 04 nternal..!....).\n0050: d0 00 00 00 00 00 00 ....... kind = dns peer_addr = [::1]:40997 req_id = 47a86863-d1ef-4349-9030-fedce911df67
25062026-01-14T21:22:49.212ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 22879,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 24,\n 95,\n 99,\n 108,\n 105,\n 99,\n 107,\n 104,\n 111,\n 117,\n 115,\n 101,\n 45,\n 97,\n 100,\n 109,\n 105,\n 110,\n 45,\n 107,\n 101,\n 101,\n 112,\n 101,\n 114,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:40997 req_id = 47a86863-d1ef-4349-9030-fedce911df67
25072026-01-14T21:22:49.213ZDEBGtest_vpc_firewall (store): query key key = _clickhouse-admin-keeper._tcp
25082026-01-14T21:22:49.213ZERROtest_vpc_firewall (dns): failed to handle incoming DNS message: MessageRequest { header: Header { id: 22879, message_type: Query, op_code: Query, authoritative: false, truncation: false, recursion_desired: true, recursion_available: false, authentic_data: false, checking_disabled: false, response_code: NoError, query_count: 1, answer_count: 0, name_server_count: 0, additional_count: 1, }, queries: Queries { queries: [ LowerQuery { name: LowerName( Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), ), original: Query { name: Name("_clickhouse-admin-keeper._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN, }, }, ], original: [ 24, 95, 99, 108, 105, 99, 107, 104, 111, 117, 115, 101, 45, 97, 100, 109, 105, 110, 45, 107, 101, 101, 112, 101, 114, 4, 95, 116, 99, 112, 13, 99, 111, 110, 116, 114, 111, 108, 45, 112, 108, 97, 110, 101, 5, 111, 120, 105, 100, 101, 8, 105, 110, 116, 101, 114, 110, 97, 108, 0, 0, 33, 0, 1, ], }, answers: [], name_servers: [], additionals: [], sig0: [], edns: Some( Edns { rcode_high: 0, version: 0, flags: EdnsFlags { dnssec_ok: false, z: 0, }, max_payload: 1232, options: OPT { options: [], }, }, ), } NXDOMAIN: _clickhouse-admin-keeper._tcp.control-plane.oxide.internal kind = dns peer_addr = [::1]:40997 req_id = 47a86863-d1ef-4349-9030-fedce911df67
25092026-01-14T21:22:49.213ZDEBGtest_vpc_firewall (BackgroundTasks): found zones background_task = dns_config_internal count = 1 dns_group = internal
25102026-01-14T21:22:49.213ZDEBGtest_vpc_firewall (BackgroundTasks): listing DNS names for zone background_task = dns_config_internal batch_size = 100 dns_group = internal dns_zone_id = cc0b53b7-d35a-45fe-879f-3830389b03f7 dns_zone_name = control-plane.oxide.internal found_so_far = 0 version = 1
25112026-01-14T21:22:49.214ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig
25122026-01-14T21:22:49.214ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_internal dns_group = internal resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
25132026-01-14T21:22:49.214ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
25142026-01-14T21:22:49.214ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
25152026-01-14T21:22:49.214ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
25162026-01-14T21:22:49.217ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _cockroach._tcp.control-plane.oxide.internal
25172026-01-14T21:22:49.217ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 41 bc 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 A............_de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:8608 req_id = 3fc4e984-68a7-41d2-9e13-038059cafe99
25182026-01-14T21:22:49.217ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 16828,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:8608 req_id = 3fc4e984-68a7-41d2-9e13-038059cafe99
25192026-01-14T21:22:49.217ZDEBGtest_vpc_firewall (store): query key key = _dendrite._tcp
25202026-01-14T21:22:49.218ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
25212026-01-14T21:22:49.218ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:8608 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 3fc4e984-68a7-41d2-9e13-038059cafe99
25222026-01-14T21:22:49.220ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 606355859 } })
25232026-01-14T21:22:49.220ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
25242026-01-14T21:22:49.221ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 73 (0x49) bytes\n0000: 0a 69 01 00 00 01 00 00 00 00 00 01 0a 5f 63 6f .i..........._co\n0010: 63 6b 72 6f 61 63 68 04 5f 74 63 70 0d 63 6f 6e ckroach._tcp.con\n0020: 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 trol-plane.oxide\n0030: 08 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 .internal..!....\n0040: 29 04 d0 00 00 00 00 00 00 )........ kind = dns peer_addr = [::1]:41671 req_id = 771e7baa-9ca1-48a1-8af1-c422c605c7b0
25252026-01-14T21:22:49.221ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 2665,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_cockroach._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_cockroach._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 10,\n 95,\n 99,\n 111,\n 99,\n 107,\n 114,\n 111,\n 97,\n 99,\n 104,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:41671 req_id = 771e7baa-9ca1-48a1-8af1-c422c605c7b0
25262026-01-14T21:22:49.221ZDEBGtest_vpc_firewall (store): query key key = _cockroach._tcp
25272026-01-14T21:22:49.222ZDEBGtest_vpc_firewall (store): query key key = 4ca13454-dc8a-4ce2-981d-d389027c56d3.host
25282026-01-14T21:22:49.222ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:41671 query = LowerQuery { name: LowerName(Name("_cockroach._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 46432, target: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal") }) }] req_id = 771e7baa-9ca1-48a1-8af1-c422c605c7b0
25292026-01-14T21:22:49.222ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
25302026-01-14T21:22:49.233ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = DnsConfig result = Ok(())
25312026-01-14T21:22:49.239ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database
25322026-01-14T21:22:49.239ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_internal dns_group = internal roles = RoleSet { roles: {} }
25332026-01-14T21:22:49.240ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_internal dns_group = internal resource = Database result = Ok(())
25342026-01-14T21:22:49.247ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _cockroach._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_cockroach._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_cockroach._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 46432, target: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10492, tv_nsec: 634029359 } })
25352026-01-14T21:22:49.247ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
25362026-01-14T21:22:49.247ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: 3b a5 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ;...........-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:42596 req_id = 1b32ed06-2089-4a91-bcb0-bd6c1e4deead
25372026-01-14T21:22:49.248ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 15269,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:42596 req_id = 1b32ed06-2089-4a91-bcb0-bd6c1e4deead
25382026-01-14T21:22:49.249ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
25392026-01-14T21:22:49.249ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:42596 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 1b32ed06-2089-4a91-bcb0-bd6c1e4deead
25402026-01-14T21:22:49.327ZTRACtest_vpc_firewall (DpdClient): client request background_task = multicast_reconciler body = None method = GET uri = http://[::1]:65194/switch/identifiers
25412026-01-14T21:22:49.328ZDEBGtest_vpc_firewall (BackgroundTasks): found all DNS names for zone background_task = dns_config_internal dns_group = internal dns_zone_id = cc0b53b7-d35a-45fe-879f-3830389b03f7 dns_zone_name = control-plane.oxide.internal found_so_far = 27 version = 1
25422026-01-14T21:22:49.329ZDEBGtest_vpc_firewall (BackgroundTasks): read DNS config background_task = dns_config_internal dns_group = internal nzones = 1 version = 1
25432026-01-14T21:22:49.329ZINFOtest_vpc_firewall (BackgroundTasks): found latest generation (first find) background_task = dns_config_internal dns_group = internal generation = 1
25442026-01-14T21:22:49.329ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_config_internal dns_group = internal elapsed = 491.148469ms iteration = 2 status = {"generation":1}
25452026-01-14T21:22:49.329ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_propagation_internal dns_group = internal iteration = 3 reason = Dependency
25462026-01-14T21:22:49.411ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = dns_propagation_internal body = Some(Body) dns_group = internal dns_server_url = http://[::1]:43592 generation = 1 method = PUT servers = DnsServersList { addresses: [[::1]:43592] } uri = http://[::1]:43592/config
25472026-01-14T21:22:49.412ZDEBGtest_vpc_firewall (BackgroundTasks): found zones background_task = dns_config_external count = 1 dns_group = external
25482026-01-14T21:22:49.412ZDEBGtest_vpc_firewall (BackgroundTasks): listing DNS names for zone background_task = dns_config_external batch_size = 100 dns_group = external dns_zone_id = 7e523781-957d-4073-ac84-63c22cc8f35c dns_zone_name = oxide-dev.test found_so_far = 0 version = 2
25492026-01-14T21:22:49.412ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig
25502026-01-14T21:22:49.413ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = dns_config_external dns_group = external resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
25512026-01-14T21:22:49.413ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
25522026-01-14T21:22:49.413ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
25532026-01-14T21:22:49.413ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
25542026-01-14T21:22:49.415ZINFOtest_vpc_firewall (BackgroundTasks): found Silo/DNS/TLS config (initial) background_task = external_endpoints config = ExternalEndpoints { by_dns_name: {"default-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 001de000-5110-4000-8000-000000000000, db_silo: Silo { identity: SiloIdentity { id: 001de000-5110-4000-8000-000000000000, name: Name(Name("default-silo")), description: "default silo", time_created: 2026-01-14T21:22:34.357551Z, time_modified: 2026-01-14T21:22:34.357551Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }, "test-suite-silo.sys.oxide-dev.test": ExternalEndpoint { silo_id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, db_silo: Silo { identity: SiloIdentity { id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-01-14T21:22:47.634984Z, time_modified: 2026-01-14T21:22:47.634984Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }}, warnings: [NoSiloCerts { silo_id: 001de000-5110-4000-8000-000000000000, dns_name: "default-silo.sys.oxide-dev.test" }, NoSiloCerts { silo_id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, dns_name: "test-suite-silo.sys.oxide-dev.test" }], default_endpoint: Some(ExternalEndpoint { silo_id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, db_silo: Silo { identity: SiloIdentity { id: 0fe085d5-9aed-4ef7-a296-b30db2a9c70a, name: Name(Name("test-suite-silo")), description: "built-in recovery Silo", time_created: 2026-01-14T21:22:47.634984Z, time_modified: 2026-01-14T21:22:47.634984Z, time_deleted: None }, discoverable: false, authentication_mode: Local, user_provision_type: ApiOnly, mapped_fleet_roles: Object {"admin": Array [String("admin")]}, rcgen: Generation(Generation(1)), admin_group_name: None }, tls_certs: [] }) }
25552026-01-14T21:22:49.416ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = external_endpoints elapsed = 573.986149ms iteration = 2 status = {"by_dns_name":{"default-silo.sys.oxide-dev.test":{"silo_id":"001de000-5110-4000-8000-000000000000","tls_certs":[]},"test-suite-silo.sys.oxide-dev.test":{"silo_id":"0fe085d5-9aed-4ef7-a296-b30db2a9c70a","tls_certs":[]}},"default_endpoint":{"silo_id":"0fe085d5-9aed-4ef7-a296-b30db2a9c70a","tls_certs":[]},"warnings":["silo 001de000-5110-4000-8000-000000000000 with DNS name \\"default-silo.sys.oxide-dev.test\\" has no usable certificates","silo 0fe085d5-9aed-4ef7-a296-b30db2a9c70a with DNS name \\"test-suite-silo.sys.oxide-dev.test\\" has no usable certificates"]}
25562026-01-14T21:22:49.417ZINFOtest_vpc_firewall (http): accepted connection kind = dns local_addr = [::1]:43592 remote_addr = [::1]:46000
25572026-01-14T21:22:49.418ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 99 (0x63) bytes\n0000: 93 3b 01 00 00 01 00 00 00 00 00 01 24 34 63 61 .;..........$4ca\n0010: 31 33 34 35 34 2d 64 63 38 61 2d 34 63 65 32 2d 13454-dc8a-4ce2-\n0020: 39 38 31 64 2d 64 33 38 39 30 32 37 63 35 36 64 981d-d389027c56d\n0030: 33 04 68 6f 73 74 0d 63 6f 6e 74 72 6f 6c 2d 70 3.host.control-p\n0040: 6c 61 6e 65 05 6f 78 69 64 65 08 69 6e 74 65 72 lane.oxide.inter\n0050: 6e 61 6c 00 00 1c 00 01 00 00 29 04 d0 00 00 00 nal.......).....\n0060: 00 00 00 ... kind = dns peer_addr = [::1]:29237 req_id = d5ae6956-ae2f-4d2f-ab17-2cdcc61b9a04
25582026-01-14T21:22:49.418ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 37691,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 36,\n 52,\n 99,\n 97,\n 49,\n 51,\n 52,\n 53,\n 52,\n 45,\n 100,\n 99,\n 56,\n 97,\n 45,\n 52,\n 99,\n 101,\n 50,\n 45,\n 57,\n 56,\n 49,\n 100,\n 45,\n 100,\n 51,\n 56,\n 57,\n 48,\n 50,\n 55,\n 99,\n 53,\n 54,\n 100,\n 51,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:29237 req_id = d5ae6956-ae2f-4d2f-ab17-2cdcc61b9a04
25592026-01-14T21:22:49.418ZDEBGtest_vpc_firewall (store): query key key = 4ca13454-dc8a-4ce2-981d-d389027c56d3.host
25602026-01-14T21:22:49.419ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:29237 query = LowerQuery { name: LowerName(Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal.")), original: Query { name: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("4ca13454-dc8a-4ce2-981d-d389027c56d3.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = d5ae6956-ae2f-4d2f-ab17-2cdcc61b9a04
25612026-01-14T21:22:49.419ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
25622026-01-14T21:22:49.429ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = DnsConfig result = Ok(())
25632026-01-14T21:22:49.429ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database
25642026-01-14T21:22:49.429ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = dns_config_external dns_group = external roles = RoleSet { roles: {} }
25652026-01-14T21:22:49.430ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = dns_config_external dns_group = external resource = Database result = Ok(())
25662026-01-14T21:22:49.434ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection background_task = inventory_collection
25672026-01-14T21:22:49.434ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from MGS background_task = inventory_collection mgs_url = http://[::1]:59250
25682026-01-14T21:22:49.434ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/ignition
25692026-01-14T21:22:49.435ZTRACtest_vpc_firewall (http): incoming request kind = dns local_addr = [::1]:43592 method = PUT remote_addr = [::1]:46000 req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd uri = /config
25702026-01-14T21:22:49.435ZDEBGtest_vpc_firewall (http): determined request API version kind = dns local_addr = [::1]:43592 method = PUT remote_addr = [::1]:46000 req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd uri = /config version = 2.0.0
25712026-01-14T21:22:49.435ZTRACtest_vpc_firewall (DpdClient): client response background_task = multicast_reconciler result = Ok(Response { url: "http://[::1]:65194/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "984d31e3-ce73-4443-ba71-f80b5a9ffdec", "content-length": "206", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
25722026-01-14T21:22:49.435ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Creating
25732026-01-14T21:22:49.436ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
25742026-01-14T21:22:49.436ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
25752026-01-14T21:22:49.436ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
25762026-01-14T21:22:49.438ZINFOtest_vpc_firewall (store): attempting generation update new_generation = 1 req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd
25772026-01-14T21:22:49.439ZINFOtest_vpc_firewall (store): updated generation new_generation = 1 req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd
25782026-01-14T21:22:49.439ZINFOtest_vpc_firewall (http): request completed kind = dns latency_us = 4357 local_addr = [::1]:43592 method = PUT remote_addr = [::1]:46000 req_id = 88766fde-872a-40e7-bb9b-7c1f46b81ecd response_code = 204 uri = /config
25792026-01-14T21:22:49.442ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:43592 generation = 1 result = Ok(Response { url: "http://[::1]:43592/config", status: 204, headers: {"x-request-id": "88766fde-872a-40e7-bb9b-7c1f46b81ecd", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} }) servers = DnsServersList { addresses: [[::1]:43592] }
25802026-01-14T21:22:49.442ZINFOtest_vpc_firewall (BackgroundTasks): DNS server now at generation 1 background_task = dns_propagation_internal dns_group = internal dns_server_url = http://[::1]:43592 generation = 1 servers = DnsServersList { addresses: [[::1]:43592] }
25812026-01-14T21:22:49.444ZINFOtest_vpc_firewall (BackgroundTasks): DNS propagation: done background_task = dns_propagation_internal dns_group = internal generation = 1 servers = DnsServersList { addresses: [[::1]:43592] }
25822026-01-14T21:22:49.444ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_propagation_internal dns_group = internal elapsed = 115.519174ms iteration = 3 status = {"generation":1,"server_results":{"[::1]:43592":{"Ok":null}}}
25832026-01-14T21:22:49.445ZDEBGtest_vpc_firewall (BackgroundTasks): found all DNS names for zone background_task = dns_config_external dns_group = external dns_zone_id = 7e523781-957d-4073-ac84-63c22cc8f35c dns_zone_name = oxide-dev.test found_so_far = 3 version = 2
25842026-01-14T21:22:49.445ZDEBGtest_vpc_firewall (BackgroundTasks): read DNS config background_task = dns_config_external dns_group = external nzones = 1 version = 2
25852026-01-14T21:22:49.445ZINFOtest_vpc_firewall (BackgroundTasks): found latest generation (first find) background_task = dns_config_external dns_group = external generation = 2
25862026-01-14T21:22:49.445ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_config_external dns_group = external elapsed = 605.596374ms iteration = 2 status = {"generation":2}
25872026-01-14T21:22:49.445ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = dns_propagation_external dns_group = external iteration = 3 reason = Dependency
25882026-01-14T21:22:49.580ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = dns_propagation_external body = Some(Body) dns_group = external dns_server_url = http://[::1]:41277 generation = 2 method = PUT servers = DnsServersList { addresses: [[::1]:41277] } uri = http://[::1]:41277/config
25892026-01-14T21:22:49.581ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Creating
25902026-01-14T21:22:49.581ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Deleting
25912026-01-14T21:22:49.581ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
25922026-01-14T21:22:49.581ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
25932026-01-14T21:22:49.582ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
25942026-01-14T21:22:49.584ZINFOtest_vpc_firewall (http): accepted connection kind = dns local_addr = [::1]:41277 remote_addr = [::1]:37698
25952026-01-14T21:22:49.592ZTRACtest_vpc_firewall (http): incoming request kind = dns local_addr = [::1]:41277 method = PUT remote_addr = [::1]:37698 req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4 uri = /config
25962026-01-14T21:22:49.593ZDEBGtest_vpc_firewall (http): determined request API version kind = dns local_addr = [::1]:41277 method = PUT remote_addr = [::1]:37698 req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4 uri = /config version = 2.0.0
25972026-01-14T21:22:49.593ZINFOtest_vpc_firewall (store): attempting generation update new_generation = 2 req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4
25982026-01-14T21:22:49.593ZINFOtest_vpc_firewall (store): pruning trees for generations newer than 0
25992026-01-14T21:22:49.593ZDEBGtest_vpc_firewall (store): creating tree tree_name = generation_2_zone_oxide-dev.test
26002026-01-14T21:22:49.594ZDEBGtest_vpc_firewall (store): updating current config
26012026-01-14T21:22:49.594ZDEBGtest_vpc_firewall (store): flushing default tree
26022026-01-14T21:22:49.594ZINFOtest_vpc_firewall (store): pruning trees for generations older than 2 keep = 3
26032026-01-14T21:22:49.594ZINFOtest_vpc_firewall (store): updated generation new_generation = 2 req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4
26042026-01-14T21:22:49.594ZINFOtest_vpc_firewall (http): request completed kind = dns latency_us = 2077 local_addr = [::1]:41277 method = PUT remote_addr = [::1]:37698 req_id = 1e0ba954-65e5-444b-9b1c-fec4dfd207a4 response_code = 204 uri = /config
26052026-01-14T21:22:49.596ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:41277 generation = 2 result = Ok(Response { url: "http://[::1]:41277/config", status: 204, headers: {"x-request-id": "1e0ba954-65e5-444b-9b1c-fec4dfd207a4", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} }) servers = DnsServersList { addresses: [[::1]:41277] }
26062026-01-14T21:22:49.596ZINFOtest_vpc_firewall (BackgroundTasks): DNS server now at generation 2 background_task = dns_propagation_external dns_group = external dns_server_url = http://[::1]:41277 generation = 2 servers = DnsServersList { addresses: [[::1]:41277] }
26072026-01-14T21:22:49.598ZINFOtest_vpc_firewall (BackgroundTasks): DNS propagation: done background_task = dns_propagation_external dns_group = external generation = 2 servers = DnsServersList { addresses: [[::1]:41277] }
26082026-01-14T21:22:49.598ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = dns_propagation_external dns_group = external elapsed = 152.651155ms iteration = 3 status = {"generation":2,"server_results":{"[::1]:41277":{"Ok":null}}}
26092026-01-14T21:22:49.599ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Deleting
26102026-01-14T21:22:49.599ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Active
26112026-01-14T21:22:49.599ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
26122026-01-14T21:22:49.599ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
26132026-01-14T21:22:49.600ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
26142026-01-14T21:22:49.603ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/ignition", status: 200, headers: {"content-type": "application/json", "x-request-id": "84a06048-19f8-48e8-befa-509f2d9d1b4f", "content-length": "835", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26152026-01-14T21:22:49.604ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0
26162026-01-14T21:22:49.643ZINFOtest_vpc_firewall (BackgroundTasks): found new target blueprint (first find) background_task = blueprint_loader target_id = 262c300c-11e4-479f-abb4-29db6faa14be time_created = 2026-01-14 21:22:43.883217 UTC
26172026-01-14T21:22:49.643ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_loader elapsed = 798.683932ms iteration = 2 status = {"enabled":false,"status":"first target blueprint","target_id":"262c300c-11e4-479f-abb4-29db6faa14be","time_created":"2026-01-14T21:22:43.883217Z","time_found":"2026-01-14T21:22:49.643186411Z"}
26182026-01-14T21:22:49.643ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = crdb_node_id_collector iteration = 2 reason = Dependency
26192026-01-14T21:22:49.643ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Fleet
26202026-01-14T21:22:49.643ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = crdb_node_id_collector resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
26212026-01-14T21:22:49.643ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Database
26222026-01-14T21:22:49.643ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = crdb_node_id_collector roles = RoleSet { roles: {} }
26232026-01-14T21:22:49.644ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Database result = Ok(())
26242026-01-14T21:22:49.649ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_planner iteration = 4 reason = Dependency
26252026-01-14T21:22:49.649ZDEBGtest_vpc_firewall (BackgroundTasks): blueprint planning disabled, doing nothing background_task = blueprint_planner
26262026-01-14T21:22:49.649ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 75.678\u{b5}s iteration = 4 status = "Disabled"
26272026-01-14T21:22:49.649ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_executor iteration = 2 reason = Dependency
26282026-01-14T21:22:49.649ZDEBGtest_vpc_firewall (BackgroundTasks): blueprint execution: quiesce check background_task = blueprint_executor quiescing = false
26292026-01-14T21:22:49.649ZINFOtest_vpc_firewall (NexusQuiesceHandle): initial state state = Running
26302026-01-14T21:22:49.649ZINFOtest_vpc_firewall (SagaQuiesceHandle): initial quiesce state initial_state = Allowed
26312026-01-14T21:22:49.649ZWARNtest_vpc_firewall (BackgroundTasks): Blueprint execution: skipped background_task = blueprint_executor reason = blueprint disabled target_id = 262c300c-11e4-479f-abb4-29db6faa14be
26322026-01-14T21:22:49.649ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_executor elapsed = 162.069\u{b5}s iteration = 2 status = {"enabled":false,"target_id":"262c300c-11e4-479f-abb4-29db6faa14be"}
26332026-01-14T21:22:49.650ZTRACtest_vpc_firewall (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database
26342026-01-14T21:22:49.650ZDEBGtest_vpc_firewall (ServiceBalancer): roles roles = RoleSet { roles: {} }
26352026-01-14T21:22:49.651ZDEBGtest_vpc_firewall (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database result = Ok(())
26362026-01-14T21:22:49.652ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "0f52412a-e5c7-460a-ad1d-6e6a3483bb35", "content-length": "734", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26372026-01-14T21:22:49.653ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=0
26382026-01-14T21:22:49.656ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = crdb_node_id_collector roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
26392026-01-14T21:22:49.662ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Fleet result = Ok(())
26402026-01-14T21:22:49.663ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Database
26412026-01-14T21:22:49.663ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = crdb_node_id_collector roles = RoleSet { roles: {} }
26422026-01-14T21:22:49.663ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = crdb_node_id_collector resource = Database result = Ok(())
26432026-01-14T21:22:49.670ZTRACtest_vpc_firewall (ServiceBalancer): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) }
26442026-01-14T21:22:49.672ZTRACtest_vpc_firewall (ServiceBalancer): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
26452026-01-14T21:22:49.672ZTRACtest_vpc_firewall (ServiceBalancer): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database
26462026-01-14T21:22:49.672ZDEBGtest_vpc_firewall (ServiceBalancer): roles roles = RoleSet { roles: {} }
26472026-01-14T21:22:49.673ZDEBGtest_vpc_firewall (ServiceBalancer): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Database result = Ok(())
26482026-01-14T21:22:49.685ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Active
26492026-01-14T21:22:49.685ZTRACtest_vpc_firewall (BackgroundTasks): reconciling member state changes background_task = multicast_reconciler
26502026-01-14T21:22:49.685ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
26512026-01-14T21:22:49.685ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
26522026-01-14T21:22:49.686ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
26532026-01-14T21:22:49.755ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = crdb_node_id_collector body = None method = GET uri = http://[::1]:32222/node/id
26542026-01-14T21:22:49.755ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = crdb_node_id_collector result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
26552026-01-14T21:22:49.757ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = crdb_node_id_collector elapsed = 113.755734ms iteration = 2 status = {"errors":[{"err":"failed to fetch node ID for zone 4ca13454-dc8a-4ce2-981d-d389027c56d3 at http://[::1]:32222: Communication Error: error sending request for url (http://[::1]:32222/node/id): error sending request for url (http://[::1]:32222/node/id): client error (Connect): tcp connect error: Connection refused (os error 146)","zone_id":"4ca13454-dc8a-4ce2-981d-d389027c56d3"}],"nsuccess":0}
26562026-01-14T21:22:49.757ZDEBGtest_vpc_firewall (ServiceBalancer): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
26572026-01-14T21:22:49.765ZDEBGtest_vpc_firewall (ServiceBalancer): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-00000000bac3 (built_in_user), .. }) resource = Rack { parent: Fleet, key: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, lookup_type: ById(c19a698f-c6f9-4a17-ae30-20d711b8f7dc) } result = Ok(())
26582026-01-14T21:22:49.765ZINFOtest_vpc_firewall (nexus): Rack initialized
26592026-01-14T21:22:49.765ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
26602026-01-14T21:22:49.765ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
26612026-01-14T21:22:49.766ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
26622026-01-14T21:22:49.768ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
26632026-01-14T21:22:49.768ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
26642026-01-14T21:22:49.769ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
26652026-01-14T21:22:49.773ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6c998af3-7407-4335-86c6-cdc249858d2a", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26662026-01-14T21:22:49.774ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=1
26672026-01-14T21:22:49.775ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
26682026-01-14T21:22:49.775ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
26692026-01-14T21:22:49.776ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
26702026-01-14T21:22:49.778ZDEBGtest_vpc_firewall (BackgroundTasks): found groups for member reconciliation background_task = multicast_reconciler total_groups = 0
26712026-01-14T21:22:49.778ZDEBGtest_vpc_firewall (BackgroundTasks): member state reconciliation completed background_task = multicast_reconciler members_processed = 0
26722026-01-14T21:22:49.778ZTRACtest_vpc_firewall (BackgroundTasks): cleaning up deleted multicast members background_task = multicast_reconciler
26732026-01-14T21:22:49.778ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
26742026-01-14T21:22:49.779ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
26752026-01-14T21:22:49.780ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
26762026-01-14T21:22:49.783ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
26772026-01-14T21:22:49.784ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
26782026-01-14T21:22:49.785ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
26792026-01-14T21:22:49.786ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "bb5a15ee-3e32-44d6-9d3c-7a8e428c128a", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26802026-01-14T21:22:49.786ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=0
26812026-01-14T21:22:49.789ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed91135a-0847-4aba-b698-8582fb55c044", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26822026-01-14T21:22:49.789ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=1
26832026-01-14T21:22:49.790ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
26842026-01-14T21:22:49.790ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
26852026-01-14T21:22:49.790ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
26862026-01-14T21:22:49.790ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
26872026-01-14T21:22:49.791ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
26882026-01-14T21:22:49.794ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "f9cef0a8-1a5a-45e7-bf70-e400afbe66d0", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26892026-01-14T21:22:49.795ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=0
26902026-01-14T21:22:49.798ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "38d91f3c-426b-4423-bc63-4d9b7a932f01", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26912026-01-14T21:22:49.798ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=1
26922026-01-14T21:22:49.800ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "48474332-c15b-40e4-8851-c0e74c13d6b9", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26932026-01-14T21:22:49.800ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/cmpa
26942026-01-14T21:22:49.802ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "ed75abaf-a6df-4fa0-8312-71b4e1a796b0", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26952026-01-14T21:22:49.802ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
26962026-01-14T21:22:49.803ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "b5e5f5bd-97ba-4e4a-bd30-6eb20c3df6f6", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26972026-01-14T21:22:49.803ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
26982026-01-14T21:22:49.805ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "f381509c-ed5d-49de-9d17-03c6fd4a4819", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
26992026-01-14T21:22:49.805ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/0/component/rot/cfpa
27002026-01-14T21:22:49.815ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "1070a561-f83a-46e3-989a-b4625732b79d", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27012026-01-14T21:22:49.815ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1
27022026-01-14T21:22:49.816ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
27032026-01-14T21:22:49.816ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27042026-01-14T21:22:49.816ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27052026-01-14T21:22:49.817ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27062026-01-14T21:22:49.820ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "97984b89-663f-4299-a690-909f800f2d77", "content-length": "734", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27072026-01-14T21:22:49.821ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=0
27082026-01-14T21:22:49.823ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "9ac9699c-8089-4e4c-b454-851c34a302e7", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27092026-01-14T21:22:49.823ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=1
27102026-01-14T21:22:49.824ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
27112026-01-14T21:22:49.824ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27122026-01-14T21:22:49.824ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27132026-01-14T21:22:49.825ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27142026-01-14T21:22:49.832ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "75466c1d-4207-40e9-b773-6e90542fd9e7", "content-length": "111", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27152026-01-14T21:22:49.832ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=0
27162026-01-14T21:22:49.838ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "56a54102-ac7e-49a5-93ed-5b5552b9a2bf", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27172026-01-14T21:22:49.838ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=1
27182026-01-14T21:22:49.843ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "6f836106-9bde-4823-9161-9e0fa2cfbf87", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27192026-01-14T21:22:49.843ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=0
27202026-01-14T21:22:49.844ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
27212026-01-14T21:22:49.858ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
27222026-01-14T21:22:49.858ZTRACtest_vpc_firewall (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
27232026-01-14T21:22:49.858ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
27242026-01-14T21:22:49.858ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
27252026-01-14T21:22:49.858ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27262026-01-14T21:22:49.859ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27272026-01-14T21:22:49.859ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27282026-01-14T21:22:49.863ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a39cfb47-8c47-47e5-86be-21ff1c533d2e", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27292026-01-14T21:22:49.864ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=1
27302026-01-14T21:22:49.866ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "23ed68ef-333b-4853-86f0-85ca8a39bdd7", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27312026-01-14T21:22:49.866ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/cmpa
27322026-01-14T21:22:49.867ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
27332026-01-14T21:22:49.867ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27342026-01-14T21:22:49.867ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27352026-01-14T21:22:49.868ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27362026-01-14T21:22:49.871ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "d3ef301a-7049-4789-a1e8-f6cd072e0f81", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27372026-01-14T21:22:49.871ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
27382026-01-14T21:22:49.872ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "5b862a2a-6d19-406e-921f-12bf5016aabd", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27392026-01-14T21:22:49.873ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
27402026-01-14T21:22:49.876ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
27412026-01-14T21:22:49.876ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27422026-01-14T21:22:49.877ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27432026-01-14T21:22:49.877ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27442026-01-14T21:22:49.879ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "4f735541-eb00-46f4-9141-4838e2df3e32", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27452026-01-14T21:22:49.880ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/switch/1/component/rot/cfpa
27462026-01-14T21:22:49.880ZDEBGtest_vpc_firewall (BackgroundTasks): multicast group member complete deletion finished background_task = multicast_reconciler left_and_time_deleted_members_deleted = 0
27472026-01-14T21:22:49.880ZTRACtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation cycle completed active_groups_verified = 0 background_task = multicast_reconciler error_count = 0 external_groups_created = 0 external_groups_deleted = 0 member_lifecycle_transitions = 0 orphaned_member_cleanup = 0 total_dpd_operations = 0
27482026-01-14T21:22:49.883ZTRACtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent background_task = multicast_reconciler
27492026-01-14T21:22:49.883ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 728.85662ms iteration = 3 status = {"disabled":false,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
27502026-01-14T21:22:49.886ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/switch/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "c506c068-ac5b-403c-b531-c62ef5c8e25b", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27512026-01-14T21:22:49.888ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0
27522026-01-14T21:22:49.890ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
27532026-01-14T21:22:49.902ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
27542026-01-14T21:22:49.903ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27552026-01-14T21:22:49.903ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27562026-01-14T21:22:49.903ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27572026-01-14T21:22:49.906ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "57ac1cc2-99ae-43b6-b621-1a42d2a442a8", "content-length": "723", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27582026-01-14T21:22:49.906ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/active-slot
27592026-01-14T21:22:49.908ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "5706b16e-be67-4229-9e35-0154b6f0390f", "content-length": "10", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27602026-01-14T21:22:49.908ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/0
27612026-01-14T21:22:49.908ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27622026-01-14T21:22:49.908ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27632026-01-14T21:22:49.909ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27642026-01-14T21:22:49.912ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "6ef9fc88-25e8-4d7d-bf52-6eea327ef289", "content-length": "144", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27652026-01-14T21:22:49.912ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/1
27662026-01-14T21:22:49.914ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "66eac08d-0dd2-4523-90e0-01d1d02fca3c", "content-length": "147", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27672026-01-14T21:22:49.914ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=0
27682026-01-14T21:22:49.915ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27692026-01-14T21:22:49.915ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27702026-01-14T21:22:49.916ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27712026-01-14T21:22:49.920ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "019d5bf3-8c52-436d-bfca-b471db65ead8", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27722026-01-14T21:22:49.920ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=1
27732026-01-14T21:22:49.921ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27742026-01-14T21:22:49.921ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27752026-01-14T21:22:49.922ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27762026-01-14T21:22:49.926ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "379b5131-c631-4f92-96ff-014a4699a14e", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27772026-01-14T21:22:49.926ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=0
27782026-01-14T21:22:49.927ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) }
27792026-01-14T21:22:49.927ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
27802026-01-14T21:22:49.927ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27812026-01-14T21:22:49.927ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27822026-01-14T21:22:49.928ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27832026-01-14T21:22:49.933ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "4e855aa9-422e-44fa-b778-fe9025312016", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27842026-01-14T21:22:49.933ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=1
27852026-01-14T21:22:49.934ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
27862026-01-14T21:22:49.934ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27872026-01-14T21:22:49.934ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27882026-01-14T21:22:49.935ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27892026-01-14T21:22:49.938ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ec17032e-b02b-429a-a23e-e464bcdf3b1d", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27902026-01-14T21:22:49.939ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=0
27912026-01-14T21:22:49.939ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
27922026-01-14T21:22:49.939ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
27932026-01-14T21:22:49.939ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
27942026-01-14T21:22:49.940ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
27952026-01-14T21:22:49.943ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "e7a0daa7-2172-465f-ade0-ada92894efc2", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
27962026-01-14T21:22:49.944ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=1
27972026-01-14T21:22:49.944ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
27982026-01-14T21:22:49.956ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ById(001de000-074c-4000-8000-000000000000) } result = Ok(())
27992026-01-14T21:22:49.956ZTRACtest_vpc_firewall (InternalApi): successful lookup of siloed resource "Vpc" using built-in user
28002026-01-14T21:22:49.956ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28012026-01-14T21:22:49.956ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28022026-01-14T21:22:49.957ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28032026-01-14T21:22:49.961ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "ec0d1d59-6d8a-468d-b0ba-f49d6a8c2318", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
28042026-01-14T21:22:49.961ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/cmpa
28052026-01-14T21:22:49.961ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28062026-01-14T21:22:49.962ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28072026-01-14T21:22:49.963ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28082026-01-14T21:22:49.968ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8394d20a-5eb0-4baf-a691-6af97be1ab7a", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
28092026-01-14T21:22:49.968ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
28102026-01-14T21:22:49.970ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "a90ba466-4577-4c78-a438-f892ac0fe8e2", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
28112026-01-14T21:22:49.970ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
28122026-01-14T21:22:49.971ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28132026-01-14T21:22:49.971ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28142026-01-14T21:22:49.972ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28152026-01-14T21:22:49.976ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "19bdde2b-1cd6-4dd3-920a-c385751607de", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
28162026-01-14T21:22:49.976ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/0/component/rot/cfpa
28172026-01-14T21:22:49.979ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28182026-01-14T21:22:49.979ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28192026-01-14T21:22:49.981ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28202026-01-14T21:22:49.982ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/0/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "6bab6044-3253-46e4-95a1-fbc5d243af36", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
28212026-01-14T21:22:49.982ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1
28222026-01-14T21:22:49.987ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "dc651d02-fc9d-493b-b70c-0e405d56a379", "content-length": "723", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
28232026-01-14T21:22:49.987ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/active-slot
28242026-01-14T21:22:49.989ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
28252026-01-14T21:22:49.989ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
28262026-01-14T21:22:49.989ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28272026-01-14T21:22:49.989ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28282026-01-14T21:22:49.990ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28292026-01-14T21:22:49.991ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/active-slot", status: 200, headers: {"content-type": "application/json", "x-request-id": "9d5220fa-6cda-402a-9f48-2715dce56f28", "content-length": "10", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
28302026-01-14T21:22:49.991ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/0
28312026-01-14T21:22:49.995ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/0", status: 200, headers: {"content-type": "application/json", "x-request-id": "a87f6547-92c6-459e-ad14-68808f7d72ee", "content-length": "144", "date": "Wed, 14 Jan 2026 21:22:49 GMT"} })
28322026-01-14T21:22:49.995ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/1
28332026-01-14T21:22:49.996ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
28342026-01-14T21:22:49.996ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28352026-01-14T21:22:49.996ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28362026-01-14T21:22:49.997ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28372026-01-14T21:22:50.005ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/host-boot-flash/hash/1", status: 200, headers: {"content-type": "application/json", "x-request-id": "0354c0c0-c49b-4073-a6f0-b654e693ebea", "content-length": "147", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28382026-01-14T21:22:50.005ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=0
28392026-01-14T21:22:50.008ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28402026-01-14T21:22:50.008ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28412026-01-14T21:22:50.008ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28422026-01-14T21:22:50.009ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28432026-01-14T21:22:50.013ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "5a5a8e26-c3a5-42e7-95f3-5f2349bcbd65", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28442026-01-14T21:22:50.013ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=1
28452026-01-14T21:22:50.018ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28462026-01-14T21:22:50.032ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
28472026-01-14T21:22:50.032ZTRACtest_vpc_firewall (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
28482026-01-14T21:22:50.032ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") }
28492026-01-14T21:22:50.032ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
28502026-01-14T21:22:50.032ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28512026-01-14T21:22:50.032ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28522026-01-14T21:22:50.034ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28532026-01-14T21:22:50.039ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/sp/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "c3147186-8a09-4a79-bda1-f191e07ecd84", "content-length": "109", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28542026-01-14T21:22:50.039ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=0
28552026-01-14T21:22:50.040ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
28562026-01-14T21:22:50.040ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28572026-01-14T21:22:50.040ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28582026-01-14T21:22:50.041ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28592026-01-14T21:22:50.046ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "2bbe282b-28d5-4e65-adb2-e508b9e77407", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28602026-01-14T21:22:50.046ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=1
28612026-01-14T21:22:50.046ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28622026-01-14T21:22:50.047ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28632026-01-14T21:22:50.047ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28642026-01-14T21:22:50.047ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28652026-01-14T21:22:50.051ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "e9fd38c3-f2c2-4139-84af-0e5b2fe54237", "content-length": "163", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28662026-01-14T21:22:50.052ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=0
28672026-01-14T21:22:50.053ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
28682026-01-14T21:22:50.071ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000001, lookup_type: ByName("external-dns") } result = Ok(())
28692026-01-14T21:22:50.071ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28702026-01-14T21:22:50.071ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28712026-01-14T21:22:50.073ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28722026-01-14T21:22:50.078ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=0", status: 200, headers: {"content-type": "application/json", "x-request-id": "df1dc756-053d-41d4-9abb-89441c4479d0", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28732026-01-14T21:22:50.079ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=1
28742026-01-14T21:22:50.080ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28752026-01-14T21:22:50.080ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28762026-01-14T21:22:50.081ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28772026-01-14T21:22:50.086ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/stage0/caboose?firmware_slot=1", status: 200, headers: {"content-type": "application/json", "x-request-id": "05cecb9b-2c39-4977-b980-da5d9484eaf6", "content-length": "166", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28782026-01-14T21:22:50.086ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/cmpa
28792026-01-14T21:22:50.087ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28802026-01-14T21:22:50.087ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28812026-01-14T21:22:50.089ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28822026-01-14T21:22:50.093ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cmpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "49e39649-0d0f-46ef-b88e-52b4efa9a3e1", "content-length": "702", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28832026-01-14T21:22:50.093ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
28842026-01-14T21:22:50.095ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8c3605ef-589e-430a-be7a-068f09d31955", "content-length": "727", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28852026-01-14T21:22:50.095ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
28862026-01-14T21:22:50.096ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28872026-01-14T21:22:50.096ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28882026-01-14T21:22:50.097ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
28892026-01-14T21:22:50.101ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "8485085a-23be-4e95-8e05-1f5f740796ae", "content-length": "729", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28902026-01-14T21:22:50.101ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = Some(Body) gateway_url = http://[::1]:59250 method = GET uri = http://[::1]:59250/sp/sled/1/component/rot/cfpa
28912026-01-14T21:22:50.104ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection gateway_url = http://[::1]:59250 result = Ok(Response { url: "http://[::1]:59250/sp/sled/1/component/rot/cfpa", status: 200, headers: {"content-type": "application/json", "x-request-id": "2500cc9d-bb68-4526-abc5-c2394437a0f2", "content-length": "728", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
28922026-01-14T21:22:50.104ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet
28932026-01-14T21:22:50.104ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
28942026-01-14T21:22:50.104ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
28952026-01-14T21:22:50.104ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
28962026-01-14T21:22:50.106ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
28972026-01-14T21:22:50.108ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
28982026-01-14T21:22:50.108ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
28992026-01-14T21:22:50.110ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29002026-01-14T21:22:50.114ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29012026-01-14T21:22:50.124ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet result = Ok(())
29022026-01-14T21:22:50.124ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet
29032026-01-14T21:22:50.124ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29042026-01-14T21:22:50.124ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
29052026-01-14T21:22:50.124ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29062026-01-14T21:22:50.128ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
29072026-01-14T21:22:50.129ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
29082026-01-14T21:22:50.129ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
29092026-01-14T21:22:50.129ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29102026-01-14T21:22:50.129ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29112026-01-14T21:22:50.138ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29122026-01-14T21:22:50.152ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29132026-01-14T21:22:50.163ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Fleet result = Ok(())
29142026-01-14T21:22:50.163ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
29152026-01-14T21:22:50.163ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29162026-01-14T21:22:50.177ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
29172026-01-14T21:22:50.184ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
29182026-01-14T21:22:50.185ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29192026-01-14T21:22:50.185ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29202026-01-14T21:22:50.186ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29212026-01-14T21:22:50.271ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from Sled Agent background_task = inventory_collection sled_agent_url = http://[::1]:60096
29222026-01-14T21:22:50.272ZDEBGtest_vpc_firewall (BackgroundTasks): client request SledAgent = http://[::1]:60096 background_task = inventory_collection body = None method = GET uri = http://[::1]:60096/inventory
29232026-01-14T21:22:50.275ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:35880 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
29242026-01-14T21:22:50.277ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = GET remote_addr = [::1]:35880 req_id = 28d12134-3f2b-4f47-8fc4-29be21c196e3 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
29252026-01-14T21:22:50.277ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = GET remote_addr = [::1]:35880 req_id = 28d12134-3f2b-4f47-8fc4-29be21c196e3 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory version = 12.0.0
29262026-01-14T21:22:50.280ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 3208 local_addr = [::1]:60096 method = GET remote_addr = [::1]:35880 req_id = 28d12134-3f2b-4f47-8fc4-29be21c196e3 response_code = 200 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /inventory
29272026-01-14T21:22:50.281ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29282026-01-14T21:22:50.281ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29292026-01-14T21:22:50.281ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29302026-01-14T21:22:50.282ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29312026-01-14T21:22:50.284ZDEBGtest_vpc_firewall (BackgroundTasks): client response SledAgent = http://[::1]:60096 background_task = inventory_collection result = Ok(Response { url: "http://[::1]:60096/inventory", status: 200, headers: {"content-type": "application/json", "x-request-id": "28d12134-3f2b-4f47-8fc4-29be21c196e3", "content-length": "20208", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
29322026-01-14T21:22:50.292ZDEBGtest_vpc_firewall (BackgroundTasks): begin collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
29332026-01-14T21:22:50.292ZDEBGtest_vpc_firewall (BackgroundTasks): end collecting all keepers background_task = inventory_collection nkeeper_admin_clients = 0
29342026-01-14T21:22:50.292ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from CockroachDB nodes background_task = inventory_collection
29352026-01-14T21:22:50.293ZDEBGtest_vpc_firewall (CockroachClusterAdminClient): client request body = None method = GET uri = http://[::1]:32222/node/id
29362026-01-14T21:22:50.293ZDEBGtest_vpc_firewall (CockroachClusterAdminClient): client response result = Err(reqwest::Error { kind: Request, url: "http://[::1]:32222/node/id", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:32222, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
29372026-01-14T21:22:50.294ZWARNtest_vpc_firewall (CockroachClusterAdminClient): Failed to fetch metrics from CockroachDB node error = Failed to get node ID from [::1]:32222
29382026-01-14T21:22:50.377ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from NTP admin (timesync) background_task = inventory_collection sled_agent_url = http://[::1]:10123 zone_id = 541d5209-e75f-4f24-a362-01ff39fdfcab (omicron_zone)
29392026-01-14T21:22:50.377ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None method = GET ntp_admin_url = http://[::1]:10123 uri = http://[::1]:10123/timesync
29402026-01-14T21:22:50.378ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection ntp_admin_url = http://[::1]:10123 result = Err(reqwest::Error { kind: Request, url: "http://[::1]:10123/timesync", source: hyper_util::client::legacy::Error(Connect, ConnectError("tcp connect error", [::1]:10123, Os { code: 146, kind: ConnectionRefused, message: "Connection refused" })) })
29412026-01-14T21:22:50.381ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from internal DNS servers background_task = inventory_collection
29422026-01-14T21:22:50.452ZDEBGtest_vpc_firewall (BackgroundTasks): begin collection from DNS server background_task = inventory_collection zone_id = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b (omicron_zone)
29432026-01-14T21:22:50.452ZDEBGtest_vpc_firewall (BackgroundTasks): client request background_task = inventory_collection body = None internal_dns_url = http://[::1]:43592 method = GET uri = http://[::1]:43592/config
29442026-01-14T21:22:50.453ZINFOtest_vpc_firewall (http): accepted connection kind = dns local_addr = [::1]:43592 remote_addr = [::1]:55518
29452026-01-14T21:22:50.455ZTRACtest_vpc_firewall (http): incoming request kind = dns local_addr = [::1]:43592 method = GET remote_addr = [::1]:55518 req_id = ae86f80f-42c9-4bed-ae7d-51a7045e4826 uri = /config
29462026-01-14T21:22:50.455ZDEBGtest_vpc_firewall (http): determined request API version kind = dns local_addr = [::1]:43592 method = GET remote_addr = [::1]:55518 req_id = ae86f80f-42c9-4bed-ae7d-51a7045e4826 uri = /config version = 2.0.0
29472026-01-14T21:22:50.456ZINFOtest_vpc_firewall (http): request completed kind = dns latency_us = 1595 local_addr = [::1]:43592 method = GET remote_addr = [::1]:55518 req_id = ae86f80f-42c9-4bed-ae7d-51a7045e4826 response_code = 200 uri = /config
29482026-01-14T21:22:50.457ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29492026-01-14T21:22:50.476ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
29502026-01-14T21:22:50.477ZTRACtest_vpc_firewall (InternalApi): successful lookup of siloed resource "VpcSubnet" using built-in user
29512026-01-14T21:22:50.477ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") }
29522026-01-14T21:22:50.477ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-4401-4000-8000-000000000000 resource_type = Project
29532026-01-14T21:22:50.477ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29542026-01-14T21:22:50.477ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29552026-01-14T21:22:50.478ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29562026-01-14T21:22:50.495ZDEBGtest_vpc_firewall (BackgroundTasks): client response background_task = inventory_collection internal_dns_url = http://[::1]:43592 result = Ok(Response { url: "http://[::1]:43592/config", status: 200, headers: {"content-type": "application/json", "x-request-id": "ae86f80f-42c9-4bed-ae7d-51a7045e4826", "content-length": "3478", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
29572026-01-14T21:22:50.496ZDEBGtest_vpc_firewall (BackgroundTasks): finished collection from DNS server background_task = inventory_collection zone_id = 0d04af0c-5c10-4bb8-a1f4-68c71afc1b8b (omicron_zone)
29582026-01-14T21:22:50.500ZDEBGtest_vpc_firewall (BackgroundTasks): finished collection from internal DNS servers background_task = inventory_collection
29592026-01-14T21:22:50.500ZDEBGtest_vpc_firewall (BackgroundTasks): finished collection background_task = inventory_collection
29602026-01-14T21:22:50.516ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory
29612026-01-14T21:22:50.518ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_collection resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29622026-01-14T21:22:50.518ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
29632026-01-14T21:22:50.518ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29642026-01-14T21:22:50.519ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
29652026-01-14T21:22:50.530ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000001 resource_type = Silo
29662026-01-14T21:22:50.530ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29672026-01-14T21:22:50.530ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29682026-01-14T21:22:50.532ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29692026-01-14T21:22:50.533ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29702026-01-14T21:22:50.547ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Inventory result = Ok(())
29712026-01-14T21:22:50.547ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database
29722026-01-14T21:22:50.547ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_collection roles = RoleSet { roles: {} }
29732026-01-14T21:22:50.548ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_collection resource = Database result = Ok(())
29742026-01-14T21:22:50.553ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29752026-01-14T21:22:50.553ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29762026-01-14T21:22:50.553ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29772026-01-14T21:22:50.554ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29782026-01-14T21:22:50.563ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29792026-01-14T21:22:50.579ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = VpcSubnet { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000001, lookup_type: ById(001de000-5110-4000-8000-000000000001) }, key: 001de000-4401-4000-8000-000000000000, lookup_type: ById(001de000-4401-4000-8000-000000000000) }, key: 001de000-074c-4000-8000-000000000000, lookup_type: ByName("oxide-services") }, key: 001de000-c470-4000-8000-000000000002, lookup_type: ByName("nexus") } result = Ok(())
29802026-01-14T21:22:50.579ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29812026-01-14T21:22:50.579ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29822026-01-14T21:22:50.591ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29832026-01-14T21:22:50.659ZDEBGtest_vpc_firewall (InternalApi): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {Name("external-dns"): [NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], Name("nexus"): [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }]} subnet_networks = {Name("nexus"): [V4(Ipv4Network { addr: 172.30.2.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:2::, prefix: 64 })], Name("external-dns"): [V4(Ipv4Network { addr: 172.30.1.0, prefix: 24 }), V6(Ipv6Network { addr: fd77:e9d2:9cd9:1::, prefix: 64 })]} vpc_interfaces = {}
29842026-01-14T21:22:50.659ZTRACtest_vpc_firewall (InternalApi): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet
29852026-01-14T21:22:50.659ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
29862026-01-14T21:22:50.659ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29872026-01-14T21:22:50.660ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29882026-01-14T21:22:50.661ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29892026-01-14T21:22:50.676ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
29902026-01-14T21:22:50.683ZDEBGtest_vpc_firewall (InternalApi): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Fleet result = Ok(())
29912026-01-14T21:22:50.683ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
29922026-01-14T21:22:50.683ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
29932026-01-14T21:22:50.684ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
29942026-01-14T21:22:50.705ZTRACtest_vpc_firewall (InternalApi): fetched allowlist from DB allowed = AllowList { id: 001de000-a110-4000-8000-000000000000, time_created: 2026-01-14T19:25:04.038956Z, time_modified: 2026-01-14T21:22:47.898693Z, allowed_ips: None }
29952026-01-14T21:22:50.705ZDEBGtest_vpc_firewall (InternalApi): Allowlist for user-facing services is set to allow any inbound traffic. Existing VPC firewall rules will not be modified.
29962026-01-14T21:22:50.705ZDEBGtest_vpc_firewall (InternalApi): resolved firewall rules for sled agents sled_agent_rules = [ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(53), last: L4Port(53) }]), filter_protocols: Some([Udp]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }, NetworkInterface { id: 84929776-1865-4572-a79a-d93ec77efe78, kind: Service { id: 6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9 }, name: Name("external-dns-6e1ec6c0-4921-4b74-b8ef-d64b2b8b87b9"), ip_config: V6(PrivateIpv6Config { ip: fd77:e9d2:9cd9:1::6, subnet: Ipv6Net { addr: fd77:e9d2:9cd9:1::, width: 64 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 0])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: None, filter_protocols: Some([Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 3, code: Some(IcmpParamRange { first: 3, last: 4 }) })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 5, code: None })), Icmp(Some(VpcFirewallIcmpFilter { icmp_type: 11, code: None }))]), action: Allow, priority: VpcFirewallRulePriority(65534) }, ResolvedVpcFirewallRule { status: Enabled, direction: Inbound, targets: [NetworkInterface { id: 299a5ee9-0100-48c6-b685-e620250aef4f, kind: Service { id: 913233fe-92a8-4635-9572-183f495429c4 }, name: Name("nexus-913233fe-92a8-4635-9572-183f495429c4"), ip_config: V4(PrivateIpv4Config { ip: 172.30.2.6, subnet: Ipv4Net { addr: 172.30.2.0, width: 24 }, transit_ips: [] }), mac: MacAddr(MacAddr6([168, 64, 37, 255, 128, 1])), vni: Vni(100), primary: true, slot: 0 }], filter_hosts: None, filter_ports: Some([L4PortRange { first: L4Port(80), last: L4Port(80) }, L4PortRange { first: L4Port(443), last: L4Port(443) }]), filter_protocols: Some([Tcp]), action: Allow, priority: VpcFirewallRulePriority(65534) }]
29972026-01-14T21:22:50.705ZDEBGtest_vpc_firewall (InternalApi): resolved 3 rules for sleds
29982026-01-14T21:22:50.733ZDEBGtest_vpc_firewall (InternalApi): resolved sleds for vpc oxide-services vpc_to_sled = [Sled { identity: SledIdentity { id: b6d65341-167c-41df-9b5c-41cded99c229 (sled), time_created: 2026-01-14T21:22:38.887398Z, time_modified: 2026-01-14T21:22:38.887398Z }, time_deleted: None, rcgen: Generation(Generation(1)), rack_id: c19a698f-c6f9-4a17-ae30-20d711b8f7dc, is_scrimlet: true, serial_number: "SimGimlet00", part_number: "i86pc", revision: SqlU32(3), usable_hardware_threads: SqlU32(16), usable_physical_ram: ByteCount(ByteCount(34359738368)), reservoir_size: ByteCount(ByteCount(17179869184)), ip: ::1, port: SqlU16(60096), last_used_address: ::ffff, policy: InService, state: Active, sled_agent_gen: Generation(Generation(1)), repo_depot_port: SqlU16(52160), cpu_family: AmdMilan }]
29992026-01-14T21:22:50.733ZDEBGtest_vpc_firewall (InternalApi): sending firewall rules to sled agents
30002026-01-14T21:22:50.820ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
30012026-01-14T21:22:50.820ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
30022026-01-14T21:22:50.821ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
30032026-01-14T21:22:50.829ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) }
30042026-01-14T21:22:50.830ZTRACtest_vpc_firewall (InternalApi): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
30052026-01-14T21:22:50.830ZTRACtest_vpc_firewall (InternalApi): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database
30062026-01-14T21:22:50.830ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {} }
30072026-01-14T21:22:50.830ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Database result = Ok(())
30082026-01-14T21:22:50.840ZDEBGtest_vpc_firewall (InternalApi): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
30092026-01-14T21:22:50.855ZDEBGtest_vpc_firewall (InternalApi): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) resource = Sled { parent: Fleet, key: b6d65341-167c-41df-9b5c-41cded99c229 (sled), lookup_type: ById(b6d65341-167c-41df-9b5c-41cded99c229) } result = Ok(())
30102026-01-14T21:22:50.855ZDEBGtest_vpc_firewall (InternalApi): client request SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 body = Some(Body) method = PUT uri = http://[::1]:60096/vpc/001de000-074c-4000-8000-000000000000/firewall/rules
30112026-01-14T21:22:50.858ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:60096 remote_addr = [::1]:51831 sled_id = b6d65341-167c-41df-9b5c-41cded99c229
30122026-01-14T21:22:50.859ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:60096 method = PUT remote_addr = [::1]:51831 req_id = ddd63950-1fb6-4b74-8611-7edbfb69ae83 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
30132026-01-14T21:22:50.859ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:60096 method = PUT remote_addr = [::1]:51831 req_id = ddd63950-1fb6-4b74-8611-7edbfb69ae83 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules version = 12.0.0
30142026-01-14T21:22:50.862ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2984 local_addr = [::1]:60096 method = PUT remote_addr = [::1]:51831 req_id = ddd63950-1fb6-4b74-8611-7edbfb69ae83 response_code = 204 sled_id = b6d65341-167c-41df-9b5c-41cded99c229 uri = /vpc/001de000-074c-4000-8000-000000000000/firewall/rules
30152026-01-14T21:22:50.863ZDEBGtest_vpc_firewall (InternalApi): client response SledAgent = b6d65341-167c-41df-9b5c-41cded99c229 result = Ok(Response { url: "http://[::1]:60096/vpc/001de000-074c-4000-8000-000000000000/firewall/rules", status: 204, headers: {"x-request-id": "ddd63950-1fb6-4b74-8611-7edbfb69ae83", "date": "Wed, 14 Jan 2026 21:22:50 GMT"} })
30162026-01-14T21:22:50.867ZINFOtest_vpc_firewall (InternalApi): updated firewall rules on 1 sleds
30172026-01-14T21:22:50.867ZINFOtest_vpc_firewall (nexus): plumbed initial IP allowlist
30182026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = / versions = all
30192026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /access versions = all
30202026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /assets/{path} versions = all
30212026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /device/auth versions = all
30222026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /device/confirm versions = all
30232026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /device/success versions = all
30242026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /device/token versions = all
30252026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /device/verify versions = all
30262026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /experimental/v1/probes versions = all
30272026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /experimental/v1/probes versions = all
30282026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /experimental/v1/probes/{probe} versions = all
30292026-01-14T21:22:50.976ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /experimental/v1/probes/{probe} versions = all
30302026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /experimental/v1/system/support-bundles versions = all
30312026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /experimental/v1/system/support-bundles versions = all
30322026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
30332026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
30342026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
30352026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
30362026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
30372026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
30382026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
30392026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/index versions = all
30402026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /images versions = all
30412026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /login versions = all
30422026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /login/{silo_name}/local versions = all
30432026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
30442026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
30452026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
30462026-01-14T21:22:50.977ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /lookup/{path} versions = all
30472026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /projects/{path} versions = all
30482026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /projects-new versions = all
30492026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /scim/v2/Groups versions = all
30502026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /scim/v2/Groups versions = all
30512026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /scim/v2/Groups/{group_id} versions = all
30522026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /scim/v2/Groups/{group_id} versions = all
30532026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PATCH path = /scim/v2/Groups/{group_id} versions = all
30542026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /scim/v2/Groups/{group_id} versions = all
30552026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /scim/v2/Users versions = all
30562026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /scim/v2/Users versions = all
30572026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /scim/v2/Users/{user_id} versions = all
30582026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /scim/v2/Users/{user_id} versions = all
30592026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PATCH path = /scim/v2/Users/{user_id} versions = all
30602026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /scim/v2/Users/{user_id} versions = all
30612026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /settings/{path} versions = all
30622026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /system/{path} versions = all
30632026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /utilization versions = all
30642026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/affinity-groups versions = all
30652026-01-14T21:22:50.978ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/affinity-groups versions = all
30662026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/affinity-groups/{affinity_group} versions = all
30672026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/affinity-groups/{affinity_group} versions = all
30682026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/affinity-groups/{affinity_group} versions = all
30692026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/affinity-groups/{affinity_group}/members versions = all
30702026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
30712026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
30722026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
30732026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/alert-classes versions = all
30742026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/alert-receivers versions = all
30752026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/alert-receivers/{receiver} versions = all
30762026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/alert-receivers/{receiver} versions = all
30772026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/alert-receivers/{receiver}/deliveries versions = all
30782026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/alert-receivers/{receiver}/probe versions = all
30792026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/alert-receivers/{receiver}/subscriptions versions = all
30802026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/alert-receivers/{receiver}/subscriptions/{subscription} versions = all
30812026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/alerts/{alert_id}/resend versions = all
30822026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/anti-affinity-groups versions = all
30832026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/anti-affinity-groups versions = all
30842026-01-14T21:22:50.979ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
30852026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
30862026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
30872026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members versions = all
30882026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
30892026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
30902026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
30912026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/auth-settings versions = all
30922026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/auth-settings versions = all
30932026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/certificates versions = all
30942026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/certificates versions = all
30952026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/certificates/{certificate} versions = all
30962026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/certificates/{certificate} versions = all
30972026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/disks versions = all ending with 2025120300.0.0
30982026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/disks versions = all starting from 2025120300.0.0
30992026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/disks versions = all ending with 2025120300.0.0
31002026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/disks versions = all starting from 2025120300.0.0
31012026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/disks/{disk} versions = all
31022026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/disks/{disk} versions = all ending with 2025120300.0.0
31032026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/disks/{disk} versions = all starting from 2025120300.0.0
31042026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/disks/{disk}/bulk-write versions = all
31052026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
31062026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
31072026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/disks/{disk}/finalize versions = all
31082026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/floating-ips versions = all
31092026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/floating-ips versions = all
31102026-01-14T21:22:50.980ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
31112026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/floating-ips/{floating_ip} versions = all
31122026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
31132026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
31142026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
31152026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/groups versions = all
31162026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/groups/{group_id} versions = all
31172026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/images versions = all
31182026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/images versions = all
31192026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/images/{image} versions = all
31202026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/images/{image} versions = all
31212026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/images/{image}/demote versions = all
31222026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/images/{image}/promote versions = all
31232026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances versions = all
31242026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances versions = all ending with 2025120300.0.0
31252026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances versions = all starting from 2025120300.0.0
31262026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/instances/{instance} versions = all
31272026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance} versions = all
31282026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/instances/{instance} versions = all
31292026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/affinity-groups versions = all
31302026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/anti-affinity-groups versions = all
31312026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/disks versions = all ending with 2025120300.0.0
31322026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/disks versions = all starting from 2025120300.0.0
31332026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances/{instance}/disks/attach versions = all ending with 2025120300.0.0
31342026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances/{instance}/disks/attach versions = all starting from 2025120300.0.0
31352026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances/{instance}/disks/detach versions = all ending with 2025120300.0.0
31362026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances/{instance}/disks/detach versions = all starting from 2025120300.0.0
31372026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/external-ips versions = all
31382026-01-14T21:22:50.981ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
31392026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all
31402026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/multicast-groups versions = all
31412026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all
31422026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all
31432026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances/{instance}/reboot versions = all
31442026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/serial-console versions = all
31452026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
31462026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
31472026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances/{instance}/start versions = all
31482026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/instances/{instance}/stop versions = all
31492026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/internet-gateway-ip-addresses versions = all
31502026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/internet-gateway-ip-addresses versions = all
31512026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
31522026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/internet-gateway-ip-pools versions = all
31532026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/internet-gateway-ip-pools versions = all
31542026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
31552026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/internet-gateways versions = all
31562026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/internet-gateways versions = all
31572026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
31582026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/internet-gateways/{gateway} versions = all
31592026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/ip-pools versions = all
31602026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/ip-pools/{pool} versions = all
31612026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/login/{silo_name}/local versions = all
31622026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/logout versions = all
31632026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/me versions = all
31642026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/me/access-tokens versions = all
31652026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/me/access-tokens/{token_id} versions = all
31662026-01-14T21:22:50.982ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/me/groups versions = all
31672026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/me/ssh-keys versions = all
31682026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/me/ssh-keys versions = all
31692026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
31702026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
31712026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/metrics/{metric_name} versions = all
31722026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/multicast-groups versions = all
31732026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/multicast-groups versions = all
31742026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/multicast-groups/{multicast_group} versions = all
31752026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/multicast-groups/{multicast_group} versions = all
31762026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/multicast-groups/{multicast_group} versions = all
31772026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/multicast-groups/{multicast_group}/members versions = all
31782026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/multicast-groups/{multicast_group}/members versions = all
31792026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/multicast-groups/{multicast_group}/members/{instance} versions = all
31802026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/network-interfaces versions = all
31812026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/network-interfaces versions = all
31822026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/network-interfaces/{interface} versions = all
31832026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/network-interfaces/{interface} versions = all
31842026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/network-interfaces/{interface} versions = all
31852026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/ping versions = all
31862026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/policy versions = all
31872026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/policy versions = all
31882026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/projects versions = all
31892026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/projects versions = all
31902026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/projects/{project} versions = all
31912026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/projects/{project} versions = all
31922026-01-14T21:22:50.983ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/projects/{project} versions = all
31932026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/projects/{project}/policy versions = all
31942026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/projects/{project}/policy versions = all
31952026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/snapshots versions = all
31962026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/snapshots versions = all
31972026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/snapshots/{snapshot} versions = all
31982026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/snapshots/{snapshot} versions = all
31992026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/audit-log versions = all
32002026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/disks versions = all
32012026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
32022026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
32032026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/racks versions = all
32042026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
32052026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/sleds versions = all
32062026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/hardware/sleds versions = all
32072026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
32082026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
32092026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
32102026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
32112026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
32122026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/switch-port versions = all
32132026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
32142026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
32152026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
32162026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
32172026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
32182026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/switches versions = all
32192026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
32202026-01-14T21:22:50.984ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/identity-providers versions = all
32212026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/identity-providers/local/users versions = all
32222026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
32232026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
32242026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/identity-providers/saml versions = all
32252026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
32262026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/ip-pools versions = all
32272026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/ip-pools versions = all
32282026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
32292026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/ip-pools/{pool} versions = all
32302026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/ip-pools/{pool} versions = all
32312026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
32322026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
32332026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
32342026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
32352026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
32362026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
32372026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
32382026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
32392026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/ip-pools-service versions = all
32402026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/ip-pools-service/ranges versions = all
32412026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
32422026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
32432026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/metrics/{metric_name} versions = all
32442026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/multicast-groups/by-ip/{address} versions = all
32452026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/address-lot versions = all
32462026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/networking/address-lot versions = all
32472026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
32482026-01-14T21:22:50.985ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/address-lot/{address_lot} versions = all
32492026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
32502026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/allow-list versions = all
32512026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/networking/allow-list versions = all
32522026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/networking/bfd-disable versions = all
32532026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/networking/bfd-enable versions = all
32542026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bfd-status versions = all
32552026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/networking/bgp versions = all
32562026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bgp versions = all
32572026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/networking/bgp versions = all
32582026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bgp-announce-set versions = all
32592026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
32602026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
32612026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
32622026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bgp-exported versions = all
32632026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bgp-message-history versions = all
32642026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
32652026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bgp-status versions = all ending with 2025121200.0.0
32662026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/bgp-status versions = all starting from 2025121200.0.0
32672026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/inbound-icmp versions = all
32682026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/networking/inbound-icmp versions = all
32692026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/loopback-address versions = all
32702026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/networking/loopback-address versions = all
32712026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
32722026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
32732026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/switch-port-settings versions = all
32742026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/networking/switch-port-settings versions = all
32752026-01-14T21:22:50.986ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
32762026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/policy versions = all
32772026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/policy versions = all
32782026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/scim/tokens versions = all
32792026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/scim/tokens versions = all
32802026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/scim/tokens/{token_id} versions = all
32812026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/scim/tokens/{token_id} versions = all
32822026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/silo-quotas versions = all
32832026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/silos versions = all
32842026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/silos versions = all
32852026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/silos/{silo} versions = all
32862026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/silos/{silo} versions = all
32872026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all
32882026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/silos/{silo}/policy versions = all
32892026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/silos/{silo}/policy versions = all
32902026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/silos/{silo}/quotas versions = all
32912026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
32922026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/timeseries/query versions = all
32932026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/timeseries/schemas versions = all
32942026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/update/repositories versions = all
32952026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/update/repositories versions = all
32962026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/update/repositories/{system_version} versions = all
32972026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/update/status versions = all
32982026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/system/update/target-release versions = all
32992026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/update/trust-roots versions = all
33002026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/system/update/trust-roots versions = all
33012026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/system/update/trust-roots/{trust_root_id} versions = all
33022026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/update/trust-roots/{trust_root_id} versions = all
33032026-01-14T21:22:50.987ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/users versions = all
33042026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/users/{user_id} versions = all
33052026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/users-builtin versions = all
33062026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/users-builtin/{user} versions = all
33072026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/utilization/silos versions = all
33082026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/system/utilization/silos/{silo} versions = all
33092026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/timeseries/query versions = all
33102026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/users versions = all
33112026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/users/{user_id} versions = all
33122026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/users/{user_id}/access-tokens versions = all
33132026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/users/{user_id}/logout versions = all
33142026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/users/{user_id}/sessions versions = all
33152026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/utilization versions = all
33162026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpc-firewall-rules versions = all
33172026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/vpc-firewall-rules versions = all
33182026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpc-router-routes versions = all
33192026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/vpc-router-routes versions = all
33202026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
33212026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpc-router-routes/{route} versions = all
33222026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/vpc-router-routes/{route} versions = all
33232026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpc-routers versions = all
33242026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/vpc-routers versions = all
33252026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/vpc-routers/{router} versions = all
33262026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpc-routers/{router} versions = all
33272026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/vpc-routers/{router} versions = all
33282026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpc-subnets versions = all
33292026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/vpc-subnets versions = all
33302026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
33312026-01-14T21:22:50.988ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpc-subnets/{subnet} versions = all
33322026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
33332026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all
33342026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpcs versions = all
33352026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/vpcs versions = all
33362026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/vpcs/{vpc} versions = all
33372026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/vpcs/{vpc} versions = all
33382026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/vpcs/{vpc} versions = all
33392026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/webhook-receivers versions = all
33402026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = PUT path = /v1/webhook-receivers/{receiver} versions = all
33412026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = GET path = /v1/webhook-secrets versions = all
33422026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = POST path = /v1/webhook-secrets versions = all
33432026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): registered endpoint local_addr = 127.0.0.1:43638 method = DELETE path = /v1/webhook-secrets/{secret_id} versions = all
33442026-01-14T21:22:50.989ZINFOtest_vpc_firewall (dropshot_external): listening local_addr = 127.0.0.1:43638
33452026-01-14T21:22:50.989ZDEBGtest_vpc_firewall (dropshot_external): successfully registered DTrace USDT probes local_addr = 127.0.0.1:43638
33462026-01-14T21:22:51.086ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = / versions = all
33472026-01-14T21:22:51.086ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /access versions = all
33482026-01-14T21:22:51.086ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /assets/{path} versions = all
33492026-01-14T21:22:51.086ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /device/auth versions = all
33502026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /device/confirm versions = all
33512026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /device/success versions = all
33522026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /device/token versions = all
33532026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /device/verify versions = all
33542026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /experimental/v1/probes versions = all
33552026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /experimental/v1/probes versions = all
33562026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /experimental/v1/probes/{probe} versions = all
33572026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /experimental/v1/probes/{probe} versions = all
33582026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /experimental/v1/system/support-bundles versions = all
33592026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /experimental/v1/system/support-bundles versions = all
33602026-01-14T21:22:51.087ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
33612026-01-14T21:22:51.088ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
33622026-01-14T21:22:51.088ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /experimental/v1/system/support-bundles/{bundle_id} versions = all
33632026-01-14T21:22:51.088ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
33642026-01-14T21:22:51.088ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download versions = all
33652026-01-14T21:22:51.088ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
33662026-01-14T21:22:51.090ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = HEAD path = /experimental/v1/system/support-bundles/{bundle_id}/download/{file} versions = all
33672026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /experimental/v1/system/support-bundles/{bundle_id}/index versions = all
33682026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /images versions = all
33692026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /login versions = all
33702026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /login/{silo_name}/local versions = all
33712026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /login/{silo_name}/saml/{provider_name} versions = all
33722026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /login/{silo_name}/saml/{provider_name} versions = all
33732026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /login/{silo_name}/saml/{provider_name}/redirect versions = all
33742026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /lookup/{path} versions = all
33752026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /projects/{path} versions = all
33762026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /projects-new versions = all
33772026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /scim/v2/Groups versions = all
33782026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /scim/v2/Groups versions = all
33792026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /scim/v2/Groups/{group_id} versions = all
33802026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /scim/v2/Groups/{group_id} versions = all
33812026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PATCH path = /scim/v2/Groups/{group_id} versions = all
33822026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /scim/v2/Groups/{group_id} versions = all
33832026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /scim/v2/Users versions = all
33842026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /scim/v2/Users versions = all
33852026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /scim/v2/Users/{user_id} versions = all
33862026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /scim/v2/Users/{user_id} versions = all
33872026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PATCH path = /scim/v2/Users/{user_id} versions = all
33882026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /scim/v2/Users/{user_id} versions = all
33892026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /settings/{path} versions = all
33902026-01-14T21:22:51.091ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /system/{path} versions = all
33912026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /utilization versions = all
33922026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/affinity-groups versions = all
33932026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/affinity-groups versions = all
33942026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/affinity-groups/{affinity_group} versions = all
33952026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/affinity-groups/{affinity_group} versions = all
33962026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/affinity-groups/{affinity_group} versions = all
33972026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/affinity-groups/{affinity_group}/members versions = all
33982026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
33992026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
34002026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/affinity-groups/{affinity_group}/members/instance/{instance} versions = all
34012026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/alert-classes versions = all
34022026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/alert-receivers versions = all
34032026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/alert-receivers/{receiver} versions = all
34042026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/alert-receivers/{receiver} versions = all
34052026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/alert-receivers/{receiver}/deliveries versions = all
34062026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/alert-receivers/{receiver}/probe versions = all
34072026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/alert-receivers/{receiver}/subscriptions versions = all
34082026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/alert-receivers/{receiver}/subscriptions/{subscription} versions = all
34092026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/alerts/{alert_id}/resend versions = all
34102026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/anti-affinity-groups versions = all
34112026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/anti-affinity-groups versions = all
34122026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
34132026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
34142026-01-14T21:22:51.092ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/anti-affinity-groups/{anti_affinity_group} versions = all
34152026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members versions = all
34162026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
34172026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
34182026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/anti-affinity-groups/{anti_affinity_group}/members/instance/{instance} versions = all
34192026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/auth-settings versions = all
34202026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/auth-settings versions = all
34212026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/certificates versions = all
34222026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/certificates versions = all
34232026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/certificates/{certificate} versions = all
34242026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/certificates/{certificate} versions = all
34252026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/disks versions = all ending with 2025120300.0.0
34262026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/disks versions = all starting from 2025120300.0.0
34272026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/disks versions = all ending with 2025120300.0.0
34282026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/disks versions = all starting from 2025120300.0.0
34292026-01-14T21:22:51.093ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/disks/{disk} versions = all
34302026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/disks/{disk} versions = all ending with 2025120300.0.0
34312026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/disks/{disk} versions = all starting from 2025120300.0.0
34322026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/disks/{disk}/bulk-write versions = all
34332026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/disks/{disk}/bulk-write-start versions = all
34342026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/disks/{disk}/bulk-write-stop versions = all
34352026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/disks/{disk}/finalize versions = all
34362026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/floating-ips versions = all
34372026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/floating-ips versions = all
34382026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/floating-ips/{floating_ip} versions = all
34392026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/floating-ips/{floating_ip} versions = all
34402026-01-14T21:22:51.094ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/floating-ips/{floating_ip} versions = all
34412026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/floating-ips/{floating_ip}/attach versions = all
34422026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/floating-ips/{floating_ip}/detach versions = all
34432026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/groups versions = all
34442026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/groups/{group_id} versions = all
34452026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/images versions = all
34462026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/images versions = all
34472026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/images/{image} versions = all
34482026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/images/{image} versions = all
34492026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/images/{image}/demote versions = all
34502026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/images/{image}/promote versions = all
34512026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances versions = all
34522026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances versions = all ending with 2025120300.0.0
34532026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances versions = all starting from 2025120300.0.0
34542026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/instances/{instance} versions = all
34552026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance} versions = all
34562026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/instances/{instance} versions = all
34572026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/affinity-groups versions = all
34582026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/anti-affinity-groups versions = all
34592026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/disks versions = all ending with 2025120300.0.0
34602026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/disks versions = all starting from 2025120300.0.0
34612026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances/{instance}/disks/attach versions = all ending with 2025120300.0.0
34622026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances/{instance}/disks/attach versions = all starting from 2025120300.0.0
34632026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances/{instance}/disks/detach versions = all ending with 2025120300.0.0
34642026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances/{instance}/disks/detach versions = all starting from 2025120300.0.0
34652026-01-14T21:22:51.095ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/external-ips versions = all
34662026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/instances/{instance}/external-ips/ephemeral versions = all
34672026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances/{instance}/external-ips/ephemeral versions = all
34682026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/multicast-groups versions = all
34692026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all
34702026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/instances/{instance}/multicast-groups/{multicast_group} versions = all
34712026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances/{instance}/reboot versions = all
34722026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/serial-console versions = all
34732026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/serial-console/stream versions = all
34742026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/instances/{instance}/ssh-public-keys versions = all
34752026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances/{instance}/start versions = all
34762026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/instances/{instance}/stop versions = all
34772026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/internet-gateway-ip-addresses versions = all
34782026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/internet-gateway-ip-addresses versions = all
34792026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/internet-gateway-ip-addresses/{address} versions = all
34802026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/internet-gateway-ip-pools versions = all
34812026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/internet-gateway-ip-pools versions = all
34822026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/internet-gateway-ip-pools/{pool} versions = all
34832026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/internet-gateways versions = all
34842026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/internet-gateways versions = all
34852026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/internet-gateways/{gateway} versions = all
34862026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/internet-gateways/{gateway} versions = all
34872026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/ip-pools versions = all
34882026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/ip-pools/{pool} versions = all
34892026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/login/{silo_name}/local versions = all
34902026-01-14T21:22:51.096ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/logout versions = all
34912026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/me versions = all
34922026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/me/access-tokens versions = all
34932026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/me/access-tokens/{token_id} versions = all
34942026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/me/groups versions = all
34952026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/me/ssh-keys versions = all
34962026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/me/ssh-keys versions = all
34972026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/me/ssh-keys/{ssh_key} versions = all
34982026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/me/ssh-keys/{ssh_key} versions = all
34992026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/metrics/{metric_name} versions = all
35002026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/multicast-groups versions = all
35012026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/multicast-groups versions = all
35022026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/multicast-groups/{multicast_group} versions = all
35032026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/multicast-groups/{multicast_group} versions = all
35042026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/multicast-groups/{multicast_group} versions = all
35052026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/multicast-groups/{multicast_group}/members versions = all
35062026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/multicast-groups/{multicast_group}/members versions = all
35072026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/multicast-groups/{multicast_group}/members/{instance} versions = all
35082026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/network-interfaces versions = all
35092026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/network-interfaces versions = all
35102026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/network-interfaces/{interface} versions = all
35112026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/network-interfaces/{interface} versions = all
35122026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/network-interfaces/{interface} versions = all
35132026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/ping versions = all
35142026-01-14T21:22:51.097ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/policy versions = all
35152026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/policy versions = all
35162026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/projects versions = all
35172026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/projects versions = all
35182026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/projects/{project} versions = all
35192026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/projects/{project} versions = all
35202026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/projects/{project} versions = all
35212026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/projects/{project}/policy versions = all
35222026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/projects/{project}/policy versions = all
35232026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/snapshots versions = all
35242026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/snapshots versions = all
35252026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/snapshots/{snapshot} versions = all
35262026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/snapshots/{snapshot} versions = all
35272026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/audit-log versions = all
35282026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/disks versions = all
35292026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/disks/{disk_id} versions = all
35302026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/rack-switch-port/{rack_id}/{switch_location}/{port}/lldp/neighbors versions = all
35312026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/racks versions = all
35322026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/racks/{rack_id} versions = all
35332026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/sleds versions = all
35342026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/hardware/sleds versions = all
35352026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/sleds/{sled_id} versions = all
35362026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/sleds/{sled_id}/disks versions = all
35372026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/sleds/{sled_id}/instances versions = all
35382026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/hardware/sleds/{sled_id}/provision-policy versions = all
35392026-01-14T21:22:51.098ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/sleds-uninitialized versions = all
35402026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/switch-port versions = all
35412026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
35422026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/hardware/switch-port/{port}/lldp/config versions = all
35432026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/hardware/switch-port/{port}/settings versions = all
35442026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/hardware/switch-port/{port}/settings versions = all
35452026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/switch-port/{port}/status versions = all
35462026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/switches versions = all
35472026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/hardware/switches/{switch_id} versions = all
35482026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/identity-providers versions = all
35492026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/identity-providers/local/users versions = all
35502026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/identity-providers/local/users/{user_id} versions = all
35512026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/identity-providers/local/users/{user_id}/set-password versions = all
35522026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/identity-providers/saml versions = all
35532026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/identity-providers/saml/{provider} versions = all
35542026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/ip-pools versions = all
35552026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/ip-pools versions = all
35562026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/ip-pools/{pool} versions = all
35572026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/ip-pools/{pool} versions = all
35582026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/ip-pools/{pool} versions = all
35592026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/ip-pools/{pool}/ranges versions = all
35602026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/ip-pools/{pool}/ranges/add versions = all
35612026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/ip-pools/{pool}/ranges/remove versions = all
35622026-01-14T21:22:51.099ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/ip-pools/{pool}/silos versions = all
35632026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/ip-pools/{pool}/silos versions = all
35642026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
35652026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/ip-pools/{pool}/silos/{silo} versions = all
35662026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/ip-pools/{pool}/utilization versions = all
35672026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/ip-pools-service versions = all
35682026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/ip-pools-service/ranges versions = all
35692026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/ip-pools-service/ranges/add versions = all
35702026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/ip-pools-service/ranges/remove versions = all
35712026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/metrics/{metric_name} versions = all
35722026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/multicast-groups/by-ip/{address} versions = all
35732026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/address-lot versions = all
35742026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/networking/address-lot versions = all
35752026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/networking/address-lot/{address_lot} versions = all
35762026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/address-lot/{address_lot} versions = all
35772026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/address-lot/{address_lot}/blocks versions = all
35782026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/allow-list versions = all
35792026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/networking/allow-list versions = all
35802026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/networking/bfd-disable versions = all
35812026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/networking/bfd-enable versions = all
35822026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bfd-status versions = all
35832026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/networking/bgp versions = all
35842026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bgp versions = all
35852026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/networking/bgp versions = all
35862026-01-14T21:22:51.100ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bgp-announce-set versions = all
35872026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/networking/bgp-announce-set versions = all
35882026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/networking/bgp-announce-set/{announce_set} versions = all
35892026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bgp-announce-set/{announce_set}/announcement versions = all
35902026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bgp-exported versions = all
35912026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bgp-message-history versions = all
35922026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bgp-routes-ipv4 versions = all
35932026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bgp-status versions = all ending with 2025121200.0.0
35942026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/bgp-status versions = all starting from 2025121200.0.0
35952026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/inbound-icmp versions = all
35962026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/networking/inbound-icmp versions = all
35972026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/loopback-address versions = all
35982026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/networking/loopback-address versions = all
35992026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/networking/loopback-address/{rack_id}/{switch_location}/{address}/{subnet_mask} versions = all
36002026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/networking/switch-port-settings versions = all
36012026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/switch-port-settings versions = all
36022026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/networking/switch-port-settings versions = all
36032026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/networking/switch-port-settings/{port} versions = all
36042026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/policy versions = all
36052026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/policy versions = all
36062026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/scim/tokens versions = all
36072026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/scim/tokens versions = all
36082026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/scim/tokens/{token_id} versions = all
36092026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/scim/tokens/{token_id} versions = all
36102026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/silo-quotas versions = all
36112026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/silos versions = all
36122026-01-14T21:22:51.101ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/silos versions = all
36132026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/silos/{silo} versions = all
36142026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/silos/{silo} versions = all
36152026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/silos/{silo}/ip-pools versions = all
36162026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/silos/{silo}/policy versions = all
36172026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/silos/{silo}/policy versions = all
36182026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/silos/{silo}/quotas versions = all
36192026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/silos/{silo}/quotas versions = all
36202026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/timeseries/query versions = all
36212026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/timeseries/schemas versions = all
36222026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/update/repositories versions = all
36232026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/update/repositories versions = all
36242026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/update/repositories/{system_version} versions = all
36252026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/update/status versions = all
36262026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/system/update/target-release versions = all
36272026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/update/trust-roots versions = all
36282026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/system/update/trust-roots versions = all
36292026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/system/update/trust-roots/{trust_root_id} versions = all
36302026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/update/trust-roots/{trust_root_id} versions = all
36312026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/users versions = all
36322026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/users/{user_id} versions = all
36332026-01-14T21:22:51.102ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/users-builtin versions = all
36342026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/users-builtin/{user} versions = all
36352026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/utilization/silos versions = all
36362026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/system/utilization/silos/{silo} versions = all
36372026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/timeseries/query versions = all
36382026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/users versions = all
36392026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/users/{user_id} versions = all
36402026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/users/{user_id}/access-tokens versions = all
36412026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/users/{user_id}/logout versions = all
36422026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/users/{user_id}/sessions versions = all
36432026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/utilization versions = all
36442026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpc-firewall-rules versions = all
36452026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/vpc-firewall-rules versions = all
36462026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpc-router-routes versions = all
36472026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/vpc-router-routes versions = all
36482026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/vpc-router-routes/{route} versions = all
36492026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpc-router-routes/{route} versions = all
36502026-01-14T21:22:51.103ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/vpc-router-routes/{route} versions = all
36512026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpc-routers versions = all
36522026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/vpc-routers versions = all
36532026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/vpc-routers/{router} versions = all
36542026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpc-routers/{router} versions = all
36552026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/vpc-routers/{router} versions = all
36562026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpc-subnets versions = all
36572026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/vpc-subnets versions = all
36582026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/vpc-subnets/{subnet} versions = all
36592026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpc-subnets/{subnet} versions = all
36602026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/vpc-subnets/{subnet} versions = all
36612026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpc-subnets/{subnet}/network-interfaces versions = all
36622026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpcs versions = all
36632026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/vpcs versions = all
36642026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/vpcs/{vpc} versions = all
36652026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/vpcs/{vpc} versions = all
36662026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/vpcs/{vpc} versions = all
36672026-01-14T21:22:51.104ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/webhook-receivers versions = all
36682026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = PUT path = /v1/webhook-receivers/{receiver} versions = all
36692026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = GET path = /v1/webhook-secrets versions = all
36702026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = POST path = /v1/webhook-secrets versions = all
36712026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (dropshot_external_techport): registered endpoint local_addr = 127.0.0.1:62502 method = DELETE path = /v1/webhook-secrets/{secret_id} versions = all
36722026-01-14T21:22:51.105ZINFOtest_vpc_firewall (dropshot_external_techport): listening local_addr = 127.0.0.1:62502
36732026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (dropshot_external_techport): successfully registered DTrace USDT probes local_addr = 127.0.0.1:62502
36742026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (nexus-producer-server): registered DTrace probes
36752026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = 127.0.0.1:47995 method = GET path = /{producer_id} versions = all
36762026-01-14T21:22:51.105ZINFOtest_vpc_firewall (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328 local_addr = 127.0.0.1:47995
36772026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (dropshot): successfully registered DTrace USDT probes local_addr = 127.0.0.1:47995
36782026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (nexus-producer-server): Requested any available port, Dropshot server has been bound to 127.0.0.1:47995
36792026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (nexus-producer-server): Nexus IP provided explicitly, will use it addr = 127.0.0.1:45286
36802026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (nexus-producer-server): starting producer registration task
36812026-01-14T21:22:51.105ZINFOtest_vpc_firewall (nexus-producer-server): starting oximeter metric producer server address = 127.0.0.1:47995 file = oximeter/producer/src/lib.rs:279 interval = 10s producer_id = 913233fe-92a8-4635-9572-183f495429c4
36822026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (init_with_steps): Running step start_oximeter
36832026-01-14T21:22:51.105ZDEBGtest_vpc_firewall: Starting Oximeter
36842026-01-14T21:22:51.105ZDEBGtest_vpc_firewall (oximeter): registered DTrace probes
36852026-01-14T21:22:51.105ZINFOtest_vpc_firewall (oximeter): starting oximeter server file = oximeter/collector/src/lib.rs:264
36862026-01-14T21:22:51.106ZDEBGtest_vpc_firewall (oximeter): creating ClickHouse client
36872026-01-14T21:22:51.106ZDEBGtest_vpc_firewall (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
36882026-01-14T21:22:51.107ZDEBGtest_vpc_firewall (producer-registration-task): registering as oximeter producer with Nexus registration_count = 0
36892026-01-14T21:22:51.107ZDEBGtest_vpc_firewall (producer-registration-task): will register with Nexus at 127.0.0.1:45286
36902026-01-14T21:22:51.202ZDEBGtest_vpc_firewall (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:45286/metrics/producers
36912026-01-14T21:22:51.204ZINFOtest_vpc_firewall (dropshot_internal): accepted connection local_addr = 127.0.0.1:45286 remote_addr = 127.0.0.1:35787
36922026-01-14T21:22:51.208ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:35787 req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9 uri = /metrics/producers
36932026-01-14T21:22:51.209ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:35787 req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9 uri = /metrics/producers version = 1.0.0
36942026-01-14T21:22:51.211ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:35787 req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9 resource = Database type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
36952026-01-14T21:22:51.211ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:35787 req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
36962026-01-14T21:22:51.214ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:35787 req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9 resource = Database result = Ok(()) type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
36972026-01-14T21:22:51.219ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = SELECT MAX(value) AS max_version FROM oximeter.version;
36982026-01-14T21:22:51.235ZWARNtest_vpc_firewall (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:900 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
36992026-01-14T21:22:51.236ZDEBGtest_vpc_firewall (oximeter-agent): oximeter database does not exist, creating collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
37002026-01-14T21:22:51.236ZINFOtest_vpc_firewall (clickhouse-client): reading db version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:800 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
37012026-01-14T21:22:51.236ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = SELECT MAX(value) AS max_version FROM oximeter.version;
37022026-01-14T21:22:51.240ZWARNtest_vpc_firewall (clickhouse-client): oximeter database does not exist, or is out-of-date collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:900 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
37032026-01-14T21:22:51.240ZINFOtest_vpc_firewall (clickhouse-client): read oximeter database version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:805 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 version = 0
37042026-01-14T21:22:51.240ZINFOtest_vpc_firewall (clickhouse-client): initializing oximeter schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:810 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
37052026-01-14T21:22:51.240ZDEBGtest_vpc_firewall (clickhouse-client): initializing ClickHouse database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
37062026-01-14T21:22:51.241ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = CREATE DATABASE IF NOT EXISTS oximeter
37072026-01-14T21:22:51.244ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\n/* The version table contains metadata about the `oximeter` database */\nCREATE TABLE IF NOT EXISTS oximeter.version\n(\n value UInt64,\n timestamp DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (value, timestamp)
37082026-01-14T21:22:51.248ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\n/* The measurement tables contain all individual samples from each timeseries.\n *\n * Each table stores a single datum type, and otherwise contains nearly the same\n * structure. The primary sorting key is on the timeseries name, key, and then\n * timestamp, so that all timeseries from the same schema are grouped, followed\n * by all samples from the same timeseries.\n *\n * This reflects that one usually looks up the _key_ in one or more field table,\n * and then uses that to index quickly into the measurements tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Bool)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37092026-01-14T21:22:51.252ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37102026-01-14T21:22:51.255ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37112026-01-14T21:22:51.258ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37122026-01-14T21:22:51.262ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt16)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37132026-01-14T21:22:51.269ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37142026-01-14T21:22:51.273ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37152026-01-14T21:22:51.283ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37162026-01-14T21:22:51.291ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37172026-01-14T21:22:51.300ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f32\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37182026-01-14T21:22:51.310ZINFOtest_vpc_firewall (dropshot_internal): request completed error_message_external = Service Unavailable error_message_internal = no Oximeter instances available for assignment latency_us = 101466 local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:35787 req_id = ca2ec4fa-7915-448e-96aa-04df68d108b9 response_code = 503 uri = /metrics/producers
37192026-01-14T21:22:51.310ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_f64\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37202026-01-14T21:22:51.311ZDEBGtest_vpc_firewall (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:45286/metrics/producers", status: 503, headers: {"content-type": "application/json", "x-request-id": "ca2ec4fa-7915-448e-96aa-04df68d108b9", "content-length": "133", "date": "Wed, 14 Jan 2026 21:22:51 GMT"} })
37212026-01-14T21:22:51.315ZWARNtest_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry count = 0 delay = 207.465267ms error = "Error Response: status: 503 Service Unavailable; headers: {\\"content-type\\": \\"application/json\\", \\"x-request-id\\": \\"ca2ec4fa-7915-448e-96aa-04df68d108b9\\", \\"content-length\\": \\"133\\", \\"date\\": \\"Wed, 14 Jan 2026 21:22:51 GMT\\"}; value: Error { error_code: Some(\\"ServiceNotAvailable\\"), message: \\"Service Unavailable\\", request_id: \\"ca2ec4fa-7915-448e-96aa-04df68d108b9\\" }" file = oximeter/producer/src/lib.rs:371
37222026-01-14T21:22:51.315ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(String)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37232026-01-14T21:22:51.319ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_bytes\n(\n timeseries_name String,\n timeseries_key UInt64,\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Right now we can't unambiguously record a nullable byte array.\n * Arrays cannot be nested in `Nullable()` types, and encoding the array as\n * a string isn't palatable for a few reasons.\n * See: https://github.com/oxidecomputer/omicron/issues/4551 for more\n * details.\n */\n datum Array(UInt8)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37242026-01-14T21:22:51.323ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativei64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Int64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37252026-01-14T21:22:51.329ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativeu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(UInt64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37262026-01-14T21:22:51.337ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float32)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37272026-01-14T21:22:51.340ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_cumulativef64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n datum Nullable(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37282026-01-14T21:22:51.348ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n /*\n * NOTE: Array types cannot be Nullable, see\n * https://clickhouse.com/docs/en/sql-reference/data-types/nullable\n * for more details.\n *\n * This means we need to use empty arrays to indicate a missing value. This\n * is unfortunate, and at this point relies on the fact that an\n * `oximeter::Histogram` cannot have zero bins. If that changes, we'll need\n * to figure out another way to represent missing samples here.\n */\n bins Array(Int8),\n counts Array(UInt64),\n min Int8,\n max Int8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37292026-01-14T21:22:51.354ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu8\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt8),\n counts Array(UInt64),\n min UInt8,\n max UInt8,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37302026-01-14T21:22:51.362ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int16),\n counts Array(UInt64),\n min Int16,\n max Int16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37312026-01-14T21:22:51.367ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu16\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt16),\n counts Array(UInt64),\n min UInt16,\n max UInt16,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37322026-01-14T21:22:51.373ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int32),\n counts Array(UInt64),\n min Int32,\n max Int32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37332026-01-14T21:22:51.380ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt32),\n counts Array(UInt64),\n min UInt32,\n max UInt32,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37342026-01-14T21:22:51.397ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogrami64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Int64),\n counts Array(UInt64),\n min Int64,\n max Int64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37352026-01-14T21:22:51.403ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramu64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(UInt64),\n counts Array(UInt64),\n min UInt64,\n max UInt64,\n sum_of_samples Int64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37362026-01-14T21:22:51.408ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf32\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float32),\n counts Array(UInt64),\n min Float32,\n max Float32,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37372026-01-14T21:22:51.413ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.measurements_histogramf64\n(\n timeseries_name String,\n timeseries_key UInt64,\n start_time DateTime64(9, 'UTC'),\n timestamp DateTime64(9, 'UTC'),\n bins Array(Float64),\n counts Array(UInt64),\n min Float64,\n max Float64,\n sum_of_samples Float64,\n squared_mean Float64,\n p50_marker_heights Array(Float64),\n p50_marker_positions Array(UInt64),\n p50_desired_marker_positions Array(Float64),\n p90_marker_heights Array(Float64),\n p90_marker_positions Array(UInt64),\n p90_desired_marker_positions Array(Float64),\n p99_marker_heights Array(Float64),\n p99_marker_positions Array(UInt64),\n p99_desired_marker_positions Array(Float64)\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, timeseries_key, start_time, timestamp)\nTTL toDateTime(timestamp) + INTERVAL 30 DAY
37382026-01-14T21:22:51.418ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\n/* The field tables store named dimensions of each timeseries.\n *\n * As with the measurement tables, there is one field table for each field data\n * type. Fields are deduplicated by using the "replacing merge tree", though\n * this behavior **must not** be relied upon for query correctness.\n *\n * The index for the fields differs from the measurements, however. Rows are\n * sorted by timeseries name, then field name, field value, and finally\n * timeseries key. This reflects the most common pattern for looking them up:\n * by field name and possibly value, within a timeseries. The resulting keys are\n * usually then used to look up measurements.\n *\n * NOTE: We may want to consider a secondary index on these tables, sorting by\n * timeseries name and then key, since it would improve lookups where one\n * already has the key. Realistically though, these tables are quite small and\n * so performance benefits will be low in absolute terms.\n *\n * TTL: We use a materialized column to expire old field table records. This\n * column is generated automatically by the database whenever a new row is\n * inserted. It cannot be inserted directly, nor is it returned in a `SELECT *`\n * query. Since these tables are `ReplacingMergeTree`s, that means the last\n * record will remain during a deduplication, which will have the last\n * timestamp. ClickHouse will then expire old data for us, similar to the\n * measurement tables.\n */\nCREATE TABLE IF NOT EXISTS oximeter.fields_bool\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Bool,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37392026-01-14T21:22:51.423ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37402026-01-14T21:22:51.429ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u8\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt8,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37412026-01-14T21:22:51.429ZINFOtest_vpc_firewall (BackgroundTasks): inserted inventory collection background_task = inventory_collection collection_id = 6f9d2406-dba2-4825-a5dc-ef88012bdcac
37422026-01-14T21:22:51.430ZDEBGtest_vpc_firewall (BackgroundTasks): inventory collection complete background_task = inventory_collection collection_id = 6f9d2406-dba2-4825-a5dc-ef88012bdcac time_started = 2026-01-14 21:22:49.434380 UTC
37432026-01-14T21:22:51.431ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = inventory_collection elapsed = 2.588209802s iteration = 3 status = {"collection_id":"6f9d2406-dba2-4825-a5dc-ef88012bdcac","time_done":"2026-01-14 21:22:50.499775 UTC","time_started":"2026-01-14 21:22:49.434380 UTC"}
37442026-01-14T21:22:51.431ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = multicast_reconciler iteration = 4 reason = Dependency
37452026-01-14T21:22:51.431ZTRACtest_vpc_firewall (BackgroundTasks): multicast group reconciler activating background_task = multicast_reconciler
37462026-01-14T21:22:51.431ZTRACtest_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass background_task = multicast_reconciler
37472026-01-14T21:22:51.431ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
37482026-01-14T21:22:51.432ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = inventory_loader iteration = 3 reason = Dependency
37492026-01-14T21:22:51.432ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory
37502026-01-14T21:22:51.432ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
37512026-01-14T21:22:51.432ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
37522026-01-14T21:22:51.432ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
37532026-01-14T21:22:51.434ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
37542026-01-14T21:22:51.438ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37552026-01-14T21:22:51.438ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 88 34 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 .4..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:43401 req_id = 904f8398-a76a-4c40-afa4-95f312a09c66
37562026-01-14T21:22:51.439ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 34868,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:43401 req_id = 904f8398-a76a-4c40-afa4-95f312a09c66
37572026-01-14T21:22:51.439ZDEBGtest_vpc_firewall (store): query key key = _dendrite._tcp
37582026-01-14T21:22:51.440ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
37592026-01-14T21:22:51.440ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:43401 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = 904f8398-a76a-4c40-afa4-95f312a09c66
37602026-01-14T21:22:51.440ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
37612026-01-14T21:22:51.450ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory result = Ok(())
37622026-01-14T21:22:51.450ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
37632026-01-14T21:22:51.450ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
37642026-01-14T21:22:51.451ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
37652026-01-14T21:22:51.452ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u16\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt16,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37662026-01-14T21:22:51.453ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10494, tv_nsec: 839927700 } })
37672026-01-14T21:22:51.453ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
37682026-01-14T21:22:51.453ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: c0 9f 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:17454 req_id = 4a0ae7ce-903c-4c7a-b694-c1803a4bb694
37692026-01-14T21:22:51.454ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 49311,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:17454 req_id = 4a0ae7ce-903c-4c7a-b694-c1803a4bb694
37702026-01-14T21:22:51.454ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
37712026-01-14T21:22:51.454ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:17454 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 4a0ae7ce-903c-4c7a-b694-c1803a4bb694
37722026-01-14T21:22:51.524ZTRACtest_vpc_firewall (DpdClient): client request background_task = multicast_reconciler body = None method = GET uri = http://[::1]:65194/switch/identifiers
37732026-01-14T21:22:51.525ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
37742026-01-14T21:22:51.525ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
37752026-01-14T21:22:51.526ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
37762026-01-14T21:22:51.529ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37772026-01-14T21:22:51.531ZTRACtest_vpc_firewall (DpdClient): client response background_task = multicast_reconciler result = Ok(Response { url: "http://[::1]:65194/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "2195ff21-a126-4417-882e-6170e0b78a78", "content-length": "206", "date": "Wed, 14 Jan 2026 21:22:51 GMT"} })
37782026-01-14T21:22:51.531ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Creating
37792026-01-14T21:22:51.532ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
37802026-01-14T21:22:51.532ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
37812026-01-14T21:22:51.533ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
37822026-01-14T21:22:51.536ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u32\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt32,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37832026-01-14T21:22:51.540ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Creating
37842026-01-14T21:22:51.540ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Deleting
37852026-01-14T21:22:51.540ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
37862026-01-14T21:22:51.540ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
37872026-01-14T21:22:51.541ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
37882026-01-14T21:22:51.545ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_i64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value Int64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37892026-01-14T21:22:51.550ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Deleting
37902026-01-14T21:22:51.550ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Active
37912026-01-14T21:22:51.550ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
37922026-01-14T21:22:51.550ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
37932026-01-14T21:22:51.551ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
37942026-01-14T21:22:51.554ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_u64\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UInt64,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
37952026-01-14T21:22:51.557ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Active
37962026-01-14T21:22:51.557ZTRACtest_vpc_firewall (BackgroundTasks): reconciling member state changes background_task = multicast_reconciler
37972026-01-14T21:22:51.557ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
37982026-01-14T21:22:51.557ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
37992026-01-14T21:22:51.561ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
38002026-01-14T21:22:51.566ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_ipaddr\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value IPv6,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
38012026-01-14T21:22:51.571ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_string\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value String,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
38022026-01-14T21:22:51.571ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
38032026-01-14T21:22:51.572ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
38042026-01-14T21:22:51.572ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
38052026-01-14T21:22:51.576ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\nCREATE TABLE IF NOT EXISTS oximeter.fields_uuid\n(\n timeseries_name String,\n timeseries_key UInt64,\n field_name String,\n field_value UUID,\n last_updated_at DateTime MATERIALIZED now()\n)\nENGINE = ReplacingMergeTree()\nORDER BY (timeseries_name, field_name, field_value, timeseries_key)\nTTL last_updated_at + INTERVAL 30 DAY
38062026-01-14T21:22:51.581ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = \n\n/* The timeseries schema table stores the extracted schema for the samples\n * oximeter collects.\n */\nCREATE TABLE IF NOT EXISTS oximeter.timeseries_schema\n(\n timeseries_name String,\n fields Nested(\n name String,\n type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'IpAddr' = 3,\n 'String' = 4,\n 'Uuid' = 6,\n 'I8' = 7,\n 'U8' = 8,\n 'I16' = 9,\n 'U16' = 10,\n 'I32' = 11,\n 'U32' = 12,\n 'U64' = 13\n ),\n source Enum(\n 'Target' = 1,\n 'Metric' = 2\n )\n ),\n datum_type Enum(\n 'Bool' = 1,\n 'I64' = 2,\n 'F64' = 3,\n 'String' = 4,\n 'Bytes' = 5,\n 'CumulativeI64' = 6,\n 'CumulativeF64' = 7,\n 'HistogramI64' = 8,\n 'HistogramF64' = 9,\n 'I8' = 10,\n 'U8' = 11,\n 'I16' = 12,\n 'U16' = 13,\n 'I32' = 14,\n 'U32' = 15,\n 'U64' = 16,\n 'F32' = 17,\n 'CumulativeU64' = 18,\n 'CumulativeF32' = 19,\n 'HistogramI8' = 20,\n 'HistogramU8' = 21,\n 'HistogramI16' = 22,\n 'HistogramU16' = 23,\n 'HistogramI32' = 24,\n 'HistogramU32' = 25,\n 'HistogramU64' = 26,\n 'HistogramF32' = 27\n ),\n created DateTime64(9, 'UTC')\n)\nENGINE = MergeTree()\nORDER BY (timeseries_name, fields.name)
38072026-01-14T21:22:51.582ZDEBGtest_vpc_firewall (BackgroundTasks): found groups for member reconciliation background_task = multicast_reconciler total_groups = 0
38082026-01-14T21:22:51.583ZDEBGtest_vpc_firewall (BackgroundTasks): member state reconciliation completed background_task = multicast_reconciler members_processed = 0
38092026-01-14T21:22:51.583ZTRACtest_vpc_firewall (BackgroundTasks): cleaning up deleted multicast members background_task = multicast_reconciler
38102026-01-14T21:22:51.583ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
38112026-01-14T21:22:51.583ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
38122026-01-14T21:22:51.584ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
38132026-01-14T21:22:51.589ZDEBGtest_vpc_firewall (BackgroundTasks): multicast group member complete deletion finished background_task = multicast_reconciler left_and_time_deleted_members_deleted = 0
38142026-01-14T21:22:51.589ZTRACtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation cycle completed active_groups_verified = 0 background_task = multicast_reconciler error_count = 0 external_groups_created = 0 external_groups_deleted = 0 member_lifecycle_transitions = 0 orphaned_member_cleanup = 0 total_dpd_operations = 0
38152026-01-14T21:22:51.591ZTRACtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent background_task = multicast_reconciler
38162026-01-14T21:22:51.591ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 160.00816ms iteration = 4 status = {"disabled":false,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
38172026-01-14T21:22:51.592ZINFOtest_vpc_firewall (clickhouse-client): inserting current version collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/db/src/client/mod.rs:831 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 version = 14
38182026-01-14T21:22:51.592ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = INSERT INTO oximeter.version (*) VALUES (14, now());
38192026-01-14T21:22:51.605ZDEBGtest_vpc_firewall (clickhouse-client): registered USDT probes collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = ce5ab9ef-56ec-4606-8eac-f66d90c3bdba
38202026-01-14T21:22:51.607ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:43210 method = GET path = /info versions = all
38212026-01-14T21:22:51.607ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:43210 method = GET path = /producers versions = all
38222026-01-14T21:22:51.607ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:43210 method = DELETE path = /producers/{producer_id} versions = all
38232026-01-14T21:22:51.608ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:43210 method = GET path = /producers/{producer_id} versions = all
38242026-01-14T21:22:51.608ZINFOtest_vpc_firewall (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328 local_addr = [::1]:43210
38252026-01-14T21:22:51.608ZDEBGtest_vpc_firewall (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:43210
38262026-01-14T21:22:51.610ZDEBGtest_vpc_firewall (oximeter): registered USDT probes
38272026-01-14T21:22:51.610ZDEBGtest_vpc_firewall (oximeter): contacting nexus
38282026-01-14T21:22:52.307ZDEBGtest_vpc_firewall (oximeter): client request body = Some(Body) method = POST uri = http://127.0.0.1:45286/metrics/collectors
38292026-01-14T21:22:52.308ZDEBGtest_vpc_firewall (producer-registration-task): will register with Nexus at 127.0.0.1:45286
38302026-01-14T21:22:52.395ZDEBGtest_vpc_firewall (producer-registration-task): client request body = Some(Body) method = POST uri = http://127.0.0.1:45286/metrics/producers
38312026-01-14T21:22:52.400ZINFOtest_vpc_firewall (dropshot_internal): accepted connection local_addr = 127.0.0.1:45286 remote_addr = 127.0.0.1:58081
38322026-01-14T21:22:52.400ZINFOtest_vpc_firewall (dropshot_internal): accepted connection local_addr = 127.0.0.1:45286 remote_addr = 127.0.0.1:57338
38332026-01-14T21:22:52.402ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:57338 req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab uri = /metrics/producers
38342026-01-14T21:22:52.402ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:57338 req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab uri = /metrics/producers version = 1.0.0
38352026-01-14T21:22:52.408ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:57338 req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab resource = Database type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
38362026-01-14T21:22:52.408ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:57338 req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
38372026-01-14T21:22:52.409ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:57338 req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab resource = Database result = Ok(()) type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
38382026-01-14T21:22:52.413ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:58081 req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a uri = /metrics/collectors
38392026-01-14T21:22:52.413ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:58081 req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a uri = /metrics/collectors version = 1.0.0
38402026-01-14T21:22:52.413ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:58081 req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a resource = Database type = user_builtin uri = /metrics/collectors user_builtin_id = 001de000-05e4-4000-8000-000000000002
38412026-01-14T21:22:52.414ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:58081 req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors user_builtin_id = 001de000-05e4-4000-8000-000000000002
38422026-01-14T21:22:52.414ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:58081 req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors user_builtin_id = 001de000-05e4-4000-8000-000000000002
38432026-01-14T21:22:52.427ZINFOtest_vpc_firewall (nexus): registered new oximeter metric collection server address = [::1]:43210 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
38442026-01-14T21:22:52.427ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 14697 local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:58081 req_id = 7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a response_code = 204 uri = /metrics/collectors
38452026-01-14T21:22:52.429ZDEBGtest_vpc_firewall (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors", status: 204, headers: {"x-request-id": "7f5a8acd-df9c-4a29-b6bb-1f1d04eb870a", "date": "Wed, 14 Jan 2026 21:22:52 GMT"} })
38462026-01-14T21:22:52.429ZINFOtest_vpc_firewall (oximeter): oximeter registered with nexus file = oximeter/collector/src/lib.rs:427 id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78
38472026-01-14T21:22:52.429ZDEBGtest_vpc_firewall (init_with_steps): Running step start_producer_server
38482026-01-14T21:22:52.429ZDEBGtest_vpc_firewall: Starting test metric Producer Server
38492026-01-14T21:22:52.436ZINFOtest_vpc_firewall (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:43638/v1/projects
38502026-01-14T21:22:52.438ZINFOtest_vpc_firewall (oximeter-agent): starting refresh list task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:554
38512026-01-14T21:22:52.550ZINFOtest_vpc_firewall (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = 913233fe-92a8-4635-9572-183f495429c4
38522026-01-14T21:22:52.550ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 148557 local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:57338 req_id = 285d7cf2-f946-46fd-91d9-692bc89e08ab response_code = 201 uri = /metrics/producers
38532026-01-14T21:22:52.551ZINFOtest_vpc_firewall (dropshot_internal): accepted connection local_addr = 127.0.0.1:45286 remote_addr = 127.0.0.1:38461
38542026-01-14T21:22:52.551ZINFOtest_vpc_firewall (dropshot_external): accepted connection local_addr = 127.0.0.1:43638 remote_addr = 127.0.0.1:64367
38552026-01-14T21:22:52.552ZINFOtest_vpc_firewall (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:557
38562026-01-14T21:22:52.552ZDEBGtest_vpc_firewall (producer-registration-task): client response result = Ok(Response { url: "http://127.0.0.1:45286/metrics/producers", status: 201, headers: {"content-type": "application/json", "x-request-id": "285d7cf2-f946-46fd-91d9-692bc89e08ab", "content-length": "41", "date": "Wed, 14 Jan 2026 21:22:52 GMT"} })
38572026-01-14T21:22:52.553ZDEBGtest_vpc_firewall (producer-registration-task): successfully registered with Nexus, pausing until time to renew lease lease_duration = 600s wait_period = 150s
38582026-01-14T21:22:52.555ZDEBGtest_vpc_firewall (oximeter): client request body = None method = GET uri = http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
38592026-01-14T21:22:52.557ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
38602026-01-14T21:22:52.557ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending version = 1.0.0
38612026-01-14T21:22:52.558ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:38461 req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956 uri = /metrics/producers
38622026-01-14T21:22:52.558ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:38461 req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956 uri = /metrics/producers version = 1.0.0
38632026-01-14T21:22:52.564ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
38642026-01-14T21:22:52.564ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
38652026-01-14T21:22:52.565ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
38662026-01-14T21:22:52.566ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:38461 req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956 resource = Database type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
38672026-01-14T21:22:52.566ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:38461 req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
38682026-01-14T21:22:52.567ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:38461 req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956 resource = Database result = Ok(()) type = user_builtin uri = /metrics/producers user_builtin_id = 001de000-05e4-4000-8000-000000000002
38692026-01-14T21:22:52.569ZTRACtest_vpc_firewall (dropshot_external): incoming request local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b uri = /v1/projects
38702026-01-14T21:22:52.569ZDEBGtest_vpc_firewall (dropshot_external): determined request API version local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b uri = /v1/projects version = 2025121200.0.0
38712026-01-14T21:22:52.569ZTRACtest_vpc_firewall (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b uri = /v1/projects
38722026-01-14T21:22:52.569ZDEBGtest_vpc_firewall (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/projects
38732026-01-14T21:22:52.569ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
38742026-01-14T21:22:52.569ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
38752026-01-14T21:22:52.570ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
38762026-01-14T21:22:52.580ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 23419 local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 0838cea8-a1fd-4705-92a3-c03ad2c4bf0a response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
38772026-01-14T21:22:52.582ZDEBGtest_vpc_firewall (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "0838cea8-a1fd-4705-92a3-c03ad2c4bf0a", "content-length": "286", "date": "Wed, 14 Jan 2026 21:22:52 GMT"} })
38782026-01-14T21:22:52.582ZDEBGtest_vpc_firewall (oximeter): client request body = None method = GET uri = http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
38792026-01-14T21:22:52.583ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
38802026-01-14T21:22:52.583ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D version = 1.0.0
38812026-01-14T21:22:52.584ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561 resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
38822026-01-14T21:22:52.584ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
38832026-01-14T21:22:52.585ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561 resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
38842026-01-14T21:22:52.587ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
38852026-01-14T21:22:52.587ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
38862026-01-14T21:22:52.589ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
38872026-01-14T21:22:52.595ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
38882026-01-14T21:22:52.595ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
38892026-01-14T21:22:52.595ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
38902026-01-14T21:22:52.596ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
38912026-01-14T21:22:52.597ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
38922026-01-14T21:22:52.599ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 15774 local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 61d06935-8c25-47c2-9be5-b07c09cd2561 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D
38932026-01-14T21:22:52.601ZDEBGtest_vpc_firewall (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiI5MTMyMzNmZS05MmE4LTQ2MzUtOTU3Mi0xODNmNDk1NDI5YzQifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "61d06935-8c25-47c2-9be5-b07c09cd2561", "content-length": "29", "date": "Wed, 14 Jan 2026 21:22:52 GMT"} })
38942026-01-14T21:22:52.601ZDEBGtest_vpc_firewall (oximeter-agent): registered new metric producer address = 127.0.0.1:47995 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4
38952026-01-14T21:22:52.602ZINFOtest_vpc_firewall (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:632 n_current_tasks = 1 n_pruned_tasks = 0
38962026-01-14T21:22:52.676ZTRACtest_vpc_firewall (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 47995
38972026-01-14T21:22:52.677ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
38982026-01-14T21:22:52.677ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
38992026-01-14T21:22:52.677ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
39002026-01-14T21:22:52.678ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
39012026-01-14T21:22:52.680ZINFOtest_vpc_firewall (nexus): assigned collector to new producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
39022026-01-14T21:22:52.681ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 122786 local_addr = 127.0.0.1:45286 method = POST remote_addr = 127.0.0.1:38461 req_id = 5ebdb58b-1e84-41df-9d0e-6ffd8032c956 response_code = 201 uri = /metrics/producers
39032026-01-14T21:22:52.682ZDEBGtest_vpc_firewall (collection-task): reporting oximeter self-collection statistics collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 47995
39042026-01-14T21:22:52.684ZDEBGtest_vpc_firewall (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 47995
39052026-01-14T21:22:52.684ZTRACtest_vpc_firewall (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
39062026-01-14T21:22:52.684ZDEBGtest_vpc_firewall (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
39072026-01-14T21:22:52.684ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = fm_sitrep_gc iteration = 2 reason = Timeout
39082026-01-14T21:22:52.684ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
39092026-01-14T21:22:52.684ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
39102026-01-14T21:22:52.685ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
39112026-01-14T21:22:52.688ZDEBGtest_vpc_firewall (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 47995
39122026-01-14T21:22:52.691ZINFOtest_vpc_firewall (dropshot): accepted connection file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:1025 local_addr = 127.0.0.1:47995 remote_addr = 127.0.0.1:55361
39132026-01-14T21:22:52.692ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet
39142026-01-14T21:22:52.692ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_gc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39152026-01-14T21:22:52.692ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
39162026-01-14T21:22:52.692ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
39172026-01-14T21:22:52.693ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
39182026-01-14T21:22:52.695ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
39192026-01-14T21:22:52.701ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
39202026-01-14T21:22:52.702ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
39212026-01-14T21:22:52.702ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
39222026-01-14T21:22:52.702ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
39232026-01-14T21:22:52.706ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = inventory_loader elapsed = 1.274261974s iteration = 3 status = {"Loaded":{"collection_id":"6f9d2406-dba2-4825-a5dc-ef88012bdcac","time_loaded":"2026-01-14T21:22:51.432354878Z","time_started":"2026-01-14T21:22:49.434380Z"}}
39242026-01-14T21:22:52.706ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = inventory_loader iteration = 4 reason = Timeout
39252026-01-14T21:22:52.706ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory
39262026-01-14T21:22:52.706ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = inventory_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39272026-01-14T21:22:52.707ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
39282026-01-14T21:22:52.707ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
39292026-01-14T21:22:52.707ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
39302026-01-14T21:22:52.709ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = physical_disk_adoption iteration = 3 reason = Dependency
39312026-01-14T21:22:52.709ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = physical_disk_adoption elapsed = 47.994\u{b5}s iteration = 3 status = {"error":"task disabled"}
39322026-01-14T21:22:52.709ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_planner iteration = 5 reason = Dependency
39332026-01-14T21:22:52.709ZDEBGtest_vpc_firewall (BackgroundTasks): blueprint planning disabled, doing nothing background_task = blueprint_planner
39342026-01-14T21:22:52.709ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_planner elapsed = 23.866\u{b5}s iteration = 5 status = "Disabled"
39352026-01-14T21:22:52.709ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = blueprint_rendezvous iteration = 3 reason = Dependency
39362026-01-14T21:22:52.709ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
39372026-01-14T21:22:52.709ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39382026-01-14T21:22:52.710ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39392026-01-14T21:22:52.710ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39402026-01-14T21:22:52.711ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39412026-01-14T21:22:52.714ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = multicast_reconciler iteration = 5 reason = Dependency
39422026-01-14T21:22:52.715ZTRACtest_vpc_firewall (BackgroundTasks): multicast group reconciler activating background_task = multicast_reconciler
39432026-01-14T21:22:52.715ZTRACtest_vpc_firewall (BackgroundTasks): starting multicast reconciliation pass background_task = multicast_reconciler
39442026-01-14T21:22:52.715ZTRACtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal
39452026-01-14T21:22:52.718ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = 127.0.0.1:47995 method = GET remote_addr = 127.0.0.1:55361 req_id = 7057ea13-062c-400e-a6d0-6658798aa19b uri = /913233fe-92a8-4635-9572-183f495429c4
39462026-01-14T21:22:52.734ZINFOtest_vpc_firewall (dropshot): request completed file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:867 latency_us = 15084 local_addr = 127.0.0.1:47995 method = GET remote_addr = 127.0.0.1:55361 req_id = 7057ea13-062c-400e-a6d0-6658798aa19b response_code = 200 uri = /913233fe-92a8-4635-9572-183f495429c4
39472026-01-14T21:22:52.734ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39482026-01-14T21:22:52.742ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
39492026-01-14T21:22:52.745ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
39502026-01-14T21:22:52.745ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
39512026-01-14T21:22:52.745ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
39522026-01-14T21:22:52.745ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
39532026-01-14T21:22:52.746ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
39542026-01-14T21:22:52.754ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39552026-01-14T21:22:52.772ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
39562026-01-14T21:22:52.772ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
39572026-01-14T21:22:52.772ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39582026-01-14T21:22:52.772ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39592026-01-14T21:22:52.772ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39602026-01-14T21:22:52.774ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39612026-01-14T21:22:52.777ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39622026-01-14T21:22:52.814ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Inventory result = Ok(())
39632026-01-14T21:22:52.814ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database
39642026-01-14T21:22:52.814ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = inventory_loader roles = RoleSet { roles: {} }
39652026-01-14T21:22:52.815ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = inventory_loader resource = Database result = Ok(())
39662026-01-14T21:22:52.817ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
39672026-01-14T21:22:52.818ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
39682026-01-14T21:22:52.819ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
39692026-01-14T21:22:52.825ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 72 (0x48) bytes\n0000: 4c 69 01 00 00 01 00 00 00 00 00 01 09 5f 64 65 Li..........._de\n0010: 6e 64 72 69 74 65 04 5f 74 63 70 0d 63 6f 6e 74 ndrite._tcp.cont\n0020: 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 69 64 65 08 rol-plane.oxide.\n0030: 69 6e 74 65 72 6e 61 6c 00 00 21 00 01 00 00 29 internal..!....)\n0040: 04 d0 00 00 00 00 00 00 ........ kind = dns peer_addr = [::1]:12414 req_id = d75b2aa7-3bbc-4b7c-86e8-82eb214186ed
39702026-01-14T21:22:52.825ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 19561,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("_dendrite._tcp.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("_dendrite._tcp.control-plane.oxide.internal."),\n query_type: SRV,\n query_class: IN,\n },\n },\n ],\n original: [\n 9,\n 95,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 4,\n 95,\n 116,\n 99,\n 112,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 33,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:12414 req_id = d75b2aa7-3bbc-4b7c-86e8-82eb214186ed
39712026-01-14T21:22:52.825ZDEBGtest_vpc_firewall (store): query key key = _dendrite._tcp
39722026-01-14T21:22:52.825ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
39732026-01-14T21:22:52.837ZDEBGtest_vpc_firewall (dns): dns response additional_records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal"), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] kind = dns peer_addr = [::1]:12414 query = LowerQuery { name: LowerName(Name("_dendrite._tcp.control-plane.oxide.internal.")), original: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN } } records = [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal") }) }] req_id = d75b2aa7-3bbc-4b7c-86e8-82eb214186ed
39742026-01-14T21:22:52.837ZTRACtest_vpc_firewall (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 47995
39752026-01-14T21:22:52.838ZWARNtest_vpc_firewall (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
39762026-01-14T21:22:52.863ZDEBGtest_vpc_firewall (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 5 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 47995
39772026-01-14T21:22:52.864ZTRACtest_vpc_firewall (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 47995
39782026-01-14T21:22:52.864ZTRACtest_vpc_firewall (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4 producer_ip = 127.0.0.1 producer_port = 47995
39792026-01-14T21:22:52.865ZDEBGtest_vpc_firewall (results-sink): inserting 19 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
39802026-01-14T21:22:52.865ZDEBGtest_vpc_firewall (results-sink-cluster): inserting 18 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
39812026-01-14T21:22:52.865ZDEBGtest_vpc_firewall (clickhouse-client): unrolling 19 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
39822026-01-14T21:22:52.866ZDEBGtest_vpc_firewall (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
39832026-01-14T21:22:52.866ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = SELECT * FROM oximeter.timeseries_schema FORMAT Native;
39842026-01-14T21:22:52.867ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
39852026-01-14T21:22:52.872ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
39862026-01-14T21:22:52.874ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
39872026-01-14T21:22:52.875ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
39882026-01-14T21:22:52.876ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
39892026-01-14T21:22:52.879ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39902026-01-14T21:22:52.879ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
39912026-01-14T21:22:52.879ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
39922026-01-14T21:22:52.880ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
39932026-01-14T21:22:52.883ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet
39942026-01-14T21:22:52.883ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_gc resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
39952026-01-14T21:22:52.883ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database
39962026-01-14T21:22:52.883ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {} }
39972026-01-14T21:22:52.887ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Database result = Ok(())
39982026-01-14T21:22:52.902ZDEBGtest_vpc_firewall (BackgroundTasks): latest inventory collection is unchanged background_task = inventory_loader original_id = 6f9d2406-dba2-4825-a5dc-ef88012bdcac original_time_started = 2026-01-14 21:22:49.434380 UTC
39992026-01-14T21:22:52.902ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = inventory_loader elapsed = 195.880992ms iteration = 4 status = {"Loaded":{"collection_id":"6f9d2406-dba2-4825-a5dc-ef88012bdcac","time_loaded":"2026-01-14T21:22:52.706776045Z","time_started":"2026-01-14T21:22:49.434380Z"}}
40002026-01-14T21:22:52.905ZTRACtest_vpc_firewall (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40012026-01-14T21:22:52.905ZDEBGtest_vpc_firewall (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 schema = TimeseriesSchema { timeseries_name: TimeseriesName("oximeter_collector:collections"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "base_route", field_type: String, source: Metric, description: "" }, FieldSchema { name: "collector_id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "collector_ip", field_type: IpAddr, source: Target, description: "" }, FieldSchema { name: "collector_port", field_type: U16, source: Target, description: "" }, FieldSchema { name: "producer_id", field_type: Uuid, source: Metric, description: "" }, FieldSchema { name: "producer_ip", field_type: IpAddr, source: Metric, description: "" }, FieldSchema { name: "producer_port", field_type: U16, source: Metric, description: "" }}, datum_type: CumulativeU64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:52.866650652Z } timeseries_name = oximeter_collector:collections
40022026-01-14T21:22:52.907ZDEBGtest_vpc_firewall (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40032026-01-14T21:22:52.907ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('oximeter_collector:collections') FORMAT Native;
40042026-01-14T21:22:52.908ZDEBGtest_vpc_firewall (DnsResolver): lookup_all_socket_v6 srv dns_name = _dendrite._tcp.control-plane.oxide.internal response = SrvLookup(Lookup { query: Query { name: Name("_dendrite._tcp.control-plane.oxide.internal."), query_type: SRV, query_class: IN }, records: [Record { name_labels: Name("_dendrite._tcp.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: SRV(SRV { priority: 0, weight: 0, port: 65194, target: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.") }) }, Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }], valid_until: Instant { tv_sec: 10496, tv_nsec: 294874075 } })
40052026-01-14T21:22:52.908ZTRACtest_vpc_firewall (DnsResolver): lookup_service_targets: looking up SRV target
40062026-01-14T21:22:52.908ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = fm_sitrep_loader iteration = 2 reason = Timeout
40072026-01-14T21:22:52.908ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet
40082026-01-14T21:22:52.908ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = fm_sitrep_loader resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40092026-01-14T21:22:52.908ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database
40102026-01-14T21:22:52.908ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
40112026-01-14T21:22:52.913ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
40122026-01-14T21:22:52.926ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
40132026-01-14T21:22:52.935ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
40142026-01-14T21:22:52.935ZTRACtest_vpc_firewall (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b uri = /v1/projects
40152026-01-14T21:22:52.935ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = AuditLog silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40162026-01-14T21:22:52.935ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40172026-01-14T21:22:52.935ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40182026-01-14T21:22:52.935ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40192026-01-14T21:22:52.936ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40202026-01-14T21:22:52.939ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
40212026-01-14T21:22:52.939ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40222026-01-14T21:22:52.939ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
40232026-01-14T21:22:52.939ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
40242026-01-14T21:22:52.940ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
40252026-01-14T21:22:52.942ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_gc roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40262026-01-14T21:22:52.949ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Modify actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_gc resource = Fleet result = Ok(())
40272026-01-14T21:22:52.951ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40282026-01-14T21:22:52.959ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Fleet result = Ok(())
40292026-01-14T21:22:52.960ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database
40302026-01-14T21:22:52.960ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = fm_sitrep_loader roles = RoleSet { roles: {} }
40312026-01-14T21:22:52.960ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = fm_sitrep_loader resource = Database result = Ok(())
40322026-01-14T21:22:52.963ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40332026-01-14T21:22:52.968ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
40342026-01-14T21:22:52.968ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
40352026-01-14T21:22:52.969ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40362026-01-14T21:22:52.969ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
40372026-01-14T21:22:52.969ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
40382026-01-14T21:22:52.969ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
40392026-01-14T21:22:52.978ZTRACtest_vpc_firewall (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40402026-01-14T21:22:52.978ZDEBGtest_vpc_firewall (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 schema = TimeseriesSchema { timeseries_name: TimeseriesName("http_service:request_latency_histogram"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }, FieldSchema { name: "name", field_type: String, source: Target, description: "" }, FieldSchema { name: "operation_id", field_type: String, source: Metric, description: "" }, FieldSchema { name: "status_code", field_type: U16, source: Metric, description: "" }}, datum_type: HistogramU64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:52.907332968Z } timeseries_name = http_service:request_latency_histogram
40412026-01-14T21:22:52.985ZDEBGtest_vpc_firewall (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40422026-01-14T21:22:52.985ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
40432026-01-14T21:22:52.986ZWARNtest_vpc_firewall (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
40442026-01-14T21:22:52.987ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40452026-01-14T21:22:52.990ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = AuditLog result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40462026-01-14T21:22:52.990ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40472026-01-14T21:22:52.990ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40482026-01-14T21:22:52.991ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40492026-01-14T21:22:52.995ZDEBGtest_vpc_firewall (BackgroundTasks): deleted 0 of 0 sitreps sitreps background_task = fm_sitrep_gc case_ereports_deleted = 0 cases_deleted = 0 ids = [] sitreps_deleted = 0
40502026-01-14T21:22:52.995ZTRACtest_vpc_firewall (BackgroundTasks): all 0 orphaned sitreps in this batch have already been deleted background_task = fm_sitrep_gc
40512026-01-14T21:22:52.995ZINFOtest_vpc_firewall (BackgroundTasks): sitrep garbage collection found 0 orphaned sitreps, deleted 0 background_task = fm_sitrep_gc
40522026-01-14T21:22:52.995ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = fm_sitrep_gc elapsed = 311.099736ms iteration = 2 status = {"errors":[],"orphaned_sitreps_deleted":0,"orphaned_sitreps_found":0}
40532026-01-14T21:22:53.004ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = fm_sitrep_loader elapsed = 95.966202ms iteration = 2 status = "NoSitrep"
40542026-01-14T21:22:53.005ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40552026-01-14T21:22:53.040ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
40562026-01-14T21:22:53.040ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
40572026-01-14T21:22:53.040ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
40582026-01-14T21:22:53.041ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
40592026-01-14T21:22:53.054ZTRACtest_vpc_firewall (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40602026-01-14T21:22:53.054ZDEBGtest_vpc_firewall (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:cpus_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:52.985503957Z } timeseries_name = collection_target:cpus_provisioned
40612026-01-14T21:22:53.056ZDEBGtest_vpc_firewall (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40622026-01-14T21:22:53.057ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
40632026-01-14T21:22:53.057ZTRACtest_vpc_firewall (dns): buffer buffer = Length: 108 (0x6c) bytes\n0000: bf 01 01 00 00 01 00 00 00 00 00 01 2d 64 65 6e ............-den\n0010: 64 72 69 74 65 2d 62 36 64 36 35 33 34 31 2d 31 drite-b6d65341-1\n0020: 36 37 63 2d 34 31 64 66 2d 39 62 35 63 2d 34 31 67c-41df-9b5c-41\n0030: 63 64 65 64 39 39 63 32 32 39 04 68 6f 73 74 0d cded99c229.host.\n0040: 63 6f 6e 74 72 6f 6c 2d 70 6c 61 6e 65 05 6f 78 control-plane.ox\n0050: 69 64 65 08 69 6e 74 65 72 6e 61 6c 00 00 1c 00 ide.internal....\n0060: 01 00 00 29 04 d0 00 00 00 00 00 00 ...)........ kind = dns peer_addr = [::1]:47791 req_id = 65c22531-7f88-4f30-b951-a6b950beb52a
40642026-01-14T21:22:53.058ZDEBGtest_vpc_firewall (dns): message_request kind = dns mr = MessageRequest {\n header: Header {\n id: 48897,\n message_type: Query,\n op_code: Query,\n authoritative: false,\n truncation: false,\n recursion_desired: true,\n recursion_available: false,\n authentic_data: false,\n checking_disabled: false,\n response_code: NoError,\n query_count: 1,\n answer_count: 0,\n name_server_count: 0,\n additional_count: 1,\n },\n queries: Queries {\n queries: [\n LowerQuery {\n name: LowerName(\n Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n ),\n original: Query {\n name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."),\n query_type: AAAA,\n query_class: IN,\n },\n },\n ],\n original: [\n 45,\n 100,\n 101,\n 110,\n 100,\n 114,\n 105,\n 116,\n 101,\n 45,\n 98,\n 54,\n 100,\n 54,\n 53,\n 51,\n 52,\n 49,\n 45,\n 49,\n 54,\n 55,\n 99,\n 45,\n 52,\n 49,\n 100,\n 102,\n 45,\n 57,\n 98,\n 53,\n 99,\n 45,\n 52,\n 49,\n 99,\n 100,\n 101,\n 100,\n 57,\n 57,\n 99,\n 50,\n 50,\n 57,\n 4,\n 104,\n 111,\n 115,\n 116,\n 13,\n 99,\n 111,\n 110,\n 116,\n 114,\n 111,\n 108,\n 45,\n 112,\n 108,\n 97,\n 110,\n 101,\n 5,\n 111,\n 120,\n 105,\n 100,\n 101,\n 8,\n 105,\n 110,\n 116,\n 101,\n 114,\n 110,\n 97,\n 108,\n 0,\n 0,\n 28,\n 0,\n 1,\n ],\n },\n answers: [],\n name_servers: [],\n additionals: [],\n sig0: [],\n edns: Some(\n Edns {\n rcode_high: 0,\n version: 0,\n flags: EdnsFlags {\n dnssec_ok: false,\n z: 0,\n },\n max_payload: 1232,\n options: OPT {\n options: [],\n },\n },\n ),\n} peer_addr = [::1]:47791 req_id = 65c22531-7f88-4f30-b951-a6b950beb52a
40652026-01-14T21:22:53.059ZDEBGtest_vpc_firewall (store): query key key = dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host
40662026-01-14T21:22:53.059ZDEBGtest_vpc_firewall (dns): dns response additional_records = [] kind = dns peer_addr = [::1]:47791 query = LowerQuery { name: LowerName(Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal.")), original: Query { name: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), query_type: AAAA, query_class: IN } } records = [Record { name_labels: Name("dendrite-b6d65341-167c-41df-9b5c-41cded99c229.host.control-plane.oxide.internal."), dns_class: IN, ttl: 0, rdata: AAAA(AAAA(::1)) }] req_id = 65c22531-7f88-4f30-b951-a6b950beb52a
40672026-01-14T21:22:53.067ZINFOtest_vpc_firewall (BackgroundTasks): ensured all Crucible datasets present in inventory have database records background_task = blueprint_rendezvous num_already_exist = 0 num_inserted = 0 num_not_in_inventory = 0
40682026-01-14T21:22:53.067ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
40692026-01-14T21:22:53.067ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40702026-01-14T21:22:53.067ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
40712026-01-14T21:22:53.067ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
40722026-01-14T21:22:53.068ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
40732026-01-14T21:22:53.075ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40742026-01-14T21:22:53.076ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40752026-01-14T21:22:53.076ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40762026-01-14T21:22:53.076ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40772026-01-14T21:22:53.086ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40782026-01-14T21:22:53.090ZTRACtest_vpc_firewall (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40792026-01-14T21:22:53.090ZDEBGtest_vpc_firewall (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:ram_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:53.056792012Z } timeseries_name = collection_target:ram_provisioned
40802026-01-14T21:22:53.092ZDEBGtest_vpc_firewall (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40812026-01-14T21:22:53.092ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
40822026-01-14T21:22:53.187ZTRACtest_vpc_firewall (DpdClient): client request background_task = multicast_reconciler body = None method = GET uri = http://[::1]:65194/switch/identifiers
40832026-01-14T21:22:53.188ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40842026-01-14T21:22:53.195ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
40852026-01-14T21:22:53.195ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet
40862026-01-14T21:22:53.195ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = blueprint_rendezvous resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
40872026-01-14T21:22:53.195ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
40882026-01-14T21:22:53.195ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
40892026-01-14T21:22:53.196ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
40902026-01-14T21:22:53.198ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40912026-01-14T21:22:53.199ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40922026-01-14T21:22:53.199ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40932026-01-14T21:22:53.199ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
40942026-01-14T21:22:53.206ZTRACtest_vpc_firewall (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40952026-01-14T21:22:53.206ZDEBGtest_vpc_firewall (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 schema = TimeseriesSchema { timeseries_name: TimeseriesName("collection_target:virtual_disk_space_provisioned"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "id", field_type: Uuid, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:53.091961882Z } timeseries_name = collection_target:virtual_disk_space_provisioned
40962026-01-14T21:22:53.213ZDEBGtest_vpc_firewall (clickhouse-client): inserting 5 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
40972026-01-14T21:22:53.214ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 6 n_rows = 5 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
40982026-01-14T21:22:53.219ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
40992026-01-14T21:22:53.225ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = ListChildren actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Fleet result = Ok(())
41002026-01-14T21:22:53.225ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database
41012026-01-14T21:22:53.225ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = blueprint_rendezvous roles = RoleSet { roles: {} }
41022026-01-14T21:22:53.225ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = blueprint_rendezvous resource = Database result = Ok(())
41032026-01-14T21:22:53.226ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
41042026-01-14T21:22:53.233ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
41052026-01-14T21:22:53.234ZINFOtest_vpc_firewall (SagaQuiesceHandle): tracking newly created saga saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41062026-01-14T21:22:53.234ZINFOtest_vpc_firewall (SagaExecutor): preparing saga saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create
41072026-01-14T21:22:53.234ZINFOtest_vpc_firewall (SEC): saga create dag = {"end_node":21,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[15,16,null],[16,17,null],[17,18,null],[2,3,null],[18,19,null],[20,0,null],[19,21,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"project_create.project_create_record","label":"ProjectCreateRecord","name":"project"}},{"Action":{"action_name":"project_create.project_create_vpc_params","label":"ProjectCreateVpcParams","name":"vpc_create_params"}},{"SubsagaStart":{"params_node_name":"vpc_create_params","saga_name":"vpc-create"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"SubsagaEnd":{"name":"vpc"}},{"Start":{"params":{"authz_silo":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null},"project_create":{"description":"a pier","name":"springfield-squidport"},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}},"device_token_expiration":null},{"mapped_fleet_roles":{}}]}}}}},"End"]},"saga_name":"project-create","start_node":20} saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
41082026-01-14T21:22:53.235ZINFOtest_vpc_firewall (SecStore): creating saga saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create
41092026-01-14T21:22:53.247ZTRACtest_vpc_firewall (DpdClient): client response background_task = multicast_reconciler result = Ok(Response { url: "http://[::1]:65194/switch/identifiers", status: 200, headers: {"content-type": "application/json", "x-request-id": "2c9aedbe-f883-40a6-89a4-6282f2c200c0", "content-length": "206", "date": "Wed, 14 Jan 2026 21:22:53 GMT"} })
41102026-01-14T21:22:53.247ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Creating
41112026-01-14T21:22:53.247ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
41122026-01-14T21:22:53.247ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
41132026-01-14T21:22:53.248ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
41142026-01-14T21:22:53.255ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
41152026-01-14T21:22:53.259ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Creating
41162026-01-14T21:22:53.260ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Deleting
41172026-01-14T21:22:53.260ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
41182026-01-14T21:22:53.260ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
41192026-01-14T21:22:53.262ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
41202026-01-14T21:22:53.265ZINFOtest_vpc_firewall (SagaExecutor): starting saga saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create
41212026-01-14T21:22:53.265ZINFOtest_vpc_firewall (SEC): saga start saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
41222026-01-14T21:22:53.265ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N020 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41232026-01-14T21:22:53.265ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 20 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41242026-01-14T21:22:53.279ZINFOtest_vpc_firewall (BackgroundTasks): all LocalStorage datasets reconciled background_task = blueprint_rendezvous num_already_exist = 0 num_already_tombstoned = 0 num_inserted = 0 num_not_in_inventory = 0 num_tombstoned = 0
41252026-01-14T21:22:53.280ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = blueprint_rendezvous elapsed = 571.339761ms iteration = 3 status = {"blueprint_id":"262c300c-11e4-479f-abb4-29db6faa14be","inventory_collection_id":"6f9d2406-dba2-4825-a5dc-ef88012bdcac","stats":{"crucible_dataset":{"num_already_exist":0,"num_inserted":0,"num_not_in_inventory":0},"debug_dataset":{"num_already_exist":0,"num_already_tombstoned":0,"num_inserted":0,"num_not_in_inventory":0,"num_tombstoned":0},"local_storage_dataset":{"num_already_exist":0,"num_already_tombstoned":0,"num_inserted":0,"num_not_in_inventory":0,"num_tombstoned":0}}}
41262026-01-14T21:22:53.287ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Deleting
41272026-01-14T21:22:53.287ZTRACtest_vpc_firewall (BackgroundTasks): searching for multicast groups background_task = multicast_reconciler state = Active
41282026-01-14T21:22:53.287ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
41292026-01-14T21:22:53.287ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
41302026-01-14T21:22:53.288ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
41312026-01-14T21:22:53.300ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N020 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41322026-01-14T21:22:53.300ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 20 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41332026-01-14T21:22:53.303ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 2 table_name = fields_ipaddr
41342026-01-14T21:22:53.303ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 13 sql = INSERT INTO oximeter.fields_string FORMAT Native
41352026-01-14T21:22:53.306ZTRACtest_vpc_firewall (BackgroundTasks): found multicast groups background_task = multicast_reconciler count = 0 state = Active
41362026-01-14T21:22:53.307ZTRACtest_vpc_firewall (BackgroundTasks): reconciling member state changes background_task = multicast_reconciler
41372026-01-14T21:22:53.307ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
41382026-01-14T21:22:53.307ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
41392026-01-14T21:22:53.308ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
41402026-01-14T21:22:53.311ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N000 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41412026-01-14T21:22:53.311ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 0 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41422026-01-14T21:22:53.313ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 13 table_name = fields_string
41432026-01-14T21:22:53.313ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 8 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
41442026-01-14T21:22:53.322ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
41452026-01-14T21:22:53.322ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
41462026-01-14T21:22:53.323ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
41472026-01-14T21:22:53.330ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41482026-01-14T21:22:53.330ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41492026-01-14T21:22:53.330ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41502026-01-14T21:22:53.330ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41512026-01-14T21:22:53.331ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41522026-01-14T21:22:53.334ZDEBGtest_vpc_firewall (BackgroundTasks): found groups for member reconciliation background_task = multicast_reconciler total_groups = 0
41532026-01-14T21:22:53.334ZDEBGtest_vpc_firewall (BackgroundTasks): member state reconciliation completed background_task = multicast_reconciler members_processed = 0
41542026-01-14T21:22:53.334ZTRACtest_vpc_firewall (BackgroundTasks): cleaning up deleted multicast members background_task = multicast_reconciler
41552026-01-14T21:22:53.334ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database
41562026-01-14T21:22:53.334ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = multicast_reconciler roles = RoleSet { roles: {} }
41572026-01-14T21:22:53.335ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = multicast_reconciler resource = Database result = Ok(())
41582026-01-14T21:22:53.338ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 8 table_name = fields_u16
41592026-01-14T21:22:53.338ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 20 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
41602026-01-14T21:22:53.346ZDEBGtest_vpc_firewall (BackgroundTasks): multicast group member complete deletion finished background_task = multicast_reconciler left_and_time_deleted_members_deleted = 0
41612026-01-14T21:22:53.346ZTRACtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation cycle completed active_groups_verified = 0 background_task = multicast_reconciler error_count = 0 external_groups_created = 0 external_groups_deleted = 0 member_lifecycle_transitions = 0 orphaned_member_cleanup = 0 total_dpd_operations = 0
41622026-01-14T21:22:53.348ZTRACtest_vpc_firewall (BackgroundTasks): multicast RPW reconciliation pass completed - dataplane consistent background_task = multicast_reconciler
41632026-01-14T21:22:53.349ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = multicast_reconciler elapsed = 634.077604ms iteration = 5 status = {"disabled":false,"errors":[],"groups_created":0,"groups_deleted":0,"groups_verified":0,"members_deleted":0,"members_processed":0}
41642026-01-14T21:22:53.349ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41652026-01-14T21:22:53.349ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41662026-01-14T21:22:53.350ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41672026-01-14T21:22:53.351ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41682026-01-14T21:22:53.357ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 20 table_name = fields_uuid
41692026-01-14T21:22:53.357ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
41702026-01-14T21:22:53.359ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41712026-01-14T21:22:53.364ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41722026-01-14T21:22:53.364ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41732026-01-14T21:22:53.364ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41742026-01-14T21:22:53.364ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = ProjectCreateRecord silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
41752026-01-14T21:22:53.366ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 1 table_name = measurements_cumulativeu64
41762026-01-14T21:22:53.366ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 19 n_rows = 6 sql = INSERT INTO oximeter.measurements_histogramu64 FORMAT Native
41772026-01-14T21:22:53.373ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 6 table_name = measurements_histogramu64
41782026-01-14T21:22:53.373ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 12 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
41792026-01-14T21:22:53.377ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 12 table_name = measurements_i64
41802026-01-14T21:22:53.377ZTRACtest_vpc_firewall (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
41812026-01-14T21:22:53.384ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N000 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41822026-01-14T21:22:53.385ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "name": String("springfield-squidport"), "time_created": String("2026-01-14T21:22:53.330230Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.330230Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]) node_id = 0 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41832026-01-14T21:22:53.390ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N001 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41842026-01-14T21:22:53.390ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 1 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41852026-01-14T21:22:53.395ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N001 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41862026-01-14T21:22:53.395ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Object {"authz_project": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd80:d618:53ef::/48"), "name": String("default")}}) node_id = 1 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41872026-01-14T21:22:53.400ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N002 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41882026-01-14T21:22:53.400ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 2 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41892026-01-14T21:22:53.405ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N002 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41902026-01-14T21:22:53.405ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 2 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41912026-01-14T21:22:53.410ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N003 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41922026-01-14T21:22:53.410ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 3 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41932026-01-14T21:22:53.416ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N003 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41942026-01-14T21:22:53.416ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("e2b55e55-c331-4278-b8fe-0db988ff2f45")) node_id = 3 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41952026-01-14T21:22:53.422ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N004 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
41962026-01-14T21:22:53.423ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 4 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41972026-01-14T21:22:53.439ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N004 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
41982026-01-14T21:22:53.439ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")) node_id = 4 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
41992026-01-14T21:22:53.444ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N005 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42002026-01-14T21:22:53.445ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 5 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42012026-01-14T21:22:53.450ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N005 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42022026-01-14T21:22:53.450ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("183f06e0-c10f-44bb-960e-f856b4d0f52f")) node_id = 5 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42032026-01-14T21:22:53.456ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N006 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42042026-01-14T21:22:53.456ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 6 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42052026-01-14T21:22:53.461ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N006 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42062026-01-14T21:22:53.461ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("5b8dc003-44ca-4ade-bbff-62be25d55e7b")) node_id = 6 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42072026-01-14T21:22:53.467ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N007 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42082026-01-14T21:22:53.467ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 7 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42092026-01-14T21:22:53.472ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N007 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42102026-01-14T21:22:53.473ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("3e0c50f0-4bf2-444c-ad00-81c6efae5752")) node_id = 7 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42112026-01-14T21:22:53.477ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N008 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42122026-01-14T21:22:53.477ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 8 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42132026-01-14T21:22:53.483ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N008 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42142026-01-14T21:22:53.483ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("fb758050-22b5-4004-83d0-0eab561238d6")) node_id = 8 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42152026-01-14T21:22:53.490ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N009 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42162026-01-14T21:22:53.490ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 9 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42172026-01-14T21:22:53.497ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N009 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42182026-01-14T21:22:53.497ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("e009feff-2962-49c4-a3ad-f9bca3c65812")) node_id = 9 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42192026-01-14T21:22:53.503ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N010 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42202026-01-14T21:22:53.503ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 10 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42212026-01-14T21:22:53.508ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42222026-01-14T21:22:53.508ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42232026-01-14T21:22:53.508ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42242026-01-14T21:22:53.508ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42252026-01-14T21:22:53.509ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42262026-01-14T21:22:53.515ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42272026-01-14T21:22:53.515ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42282026-01-14T21:22:53.515ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42292026-01-14T21:22:53.516ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42302026-01-14T21:22:53.522ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42312026-01-14T21:22:53.522ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42322026-01-14T21:22:53.522ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42332026-01-14T21:22:53.523ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42342026-01-14T21:22:53.530ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42352026-01-14T21:22:53.539ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42362026-01-14T21:22:53.539ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42372026-01-14T21:22:53.539ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42382026-01-14T21:22:53.540ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42392026-01-14T21:22:53.554ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N010 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42402026-01-14T21:22:53.554ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.508432Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.508432Z")}, "ipv6_prefix": String("fd80:d618:53ef::/48"), "project_id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "subnet_gen": Number(1), "system_router_id": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "vni": Number(3604191)}]) node_id = 10 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42412026-01-14T21:22:53.561ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N011 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42422026-01-14T21:22:53.561ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 11 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42432026-01-14T21:22:53.568ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42442026-01-14T21:22:53.568ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42452026-01-14T21:22:53.568ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42462026-01-14T21:22:53.569ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42472026-01-14T21:22:53.569ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42482026-01-14T21:22:53.578ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42492026-01-14T21:22:53.578ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42502026-01-14T21:22:53.578ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42512026-01-14T21:22:53.580ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42522026-01-14T21:22:53.587ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42532026-01-14T21:22:53.587ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42542026-01-14T21:22:53.588ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42552026-01-14T21:22:53.589ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42562026-01-14T21:22:53.596ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42572026-01-14T21:22:53.606ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42582026-01-14T21:22:53.606ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42592026-01-14T21:22:53.606ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42602026-01-14T21:22:53.607ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42612026-01-14T21:22:53.616ZTRACtest_vpc_firewall (results-sink): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
42622026-01-14T21:22:53.616ZTRACtest_vpc_firewall (results-sink-cluster): batch interval expired, but no samples to insert collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
42632026-01-14T21:22:53.679ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N011 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42642026-01-14T21:22:53.679ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 11 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42652026-01-14T21:22:53.687ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N012 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42662026-01-14T21:22:53.688ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 12 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42672026-01-14T21:22:53.694ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42682026-01-14T21:22:53.694ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42692026-01-14T21:22:53.694ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42702026-01-14T21:22:53.694ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42712026-01-14T21:22:53.695ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42722026-01-14T21:22:53.701ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42732026-01-14T21:22:53.701ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42742026-01-14T21:22:53.701ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42752026-01-14T21:22:53.702ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42762026-01-14T21:22:53.708ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42772026-01-14T21:22:53.708ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42782026-01-14T21:22:53.708ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42792026-01-14T21:22:53.709ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42802026-01-14T21:22:53.717ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42812026-01-14T21:22:53.725ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42822026-01-14T21:22:53.726ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42832026-01-14T21:22:53.726ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42842026-01-14T21:22:53.726ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42852026-01-14T21:22:53.808ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N012 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
42862026-01-14T21:22:53.808ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 12 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42872026-01-14T21:22:53.814ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N013 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
42882026-01-14T21:22:53.814ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 13 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
42892026-01-14T21:22:53.820ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42902026-01-14T21:22:53.820ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42912026-01-14T21:22:53.820ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42922026-01-14T21:22:53.820ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42932026-01-14T21:22:53.821ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42942026-01-14T21:22:53.831ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42952026-01-14T21:22:53.831ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42962026-01-14T21:22:53.831ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42972026-01-14T21:22:53.832ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42982026-01-14T21:22:53.840ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
42992026-01-14T21:22:53.841ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43002026-01-14T21:22:53.841ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43012026-01-14T21:22:53.842ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43022026-01-14T21:22:53.848ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43032026-01-14T21:22:53.859ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43042026-01-14T21:22:53.860ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43052026-01-14T21:22:53.860ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43062026-01-14T21:22:53.860ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateV6Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43072026-01-14T21:22:53.871ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N013 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
43082026-01-14T21:22:53.871ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 13 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
43092026-01-14T21:22:53.878ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N014 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
43102026-01-14T21:22:53.878ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 14 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
43112026-01-14T21:22:53.885ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43122026-01-14T21:22:53.885ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43132026-01-14T21:22:53.885ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43142026-01-14T21:22:53.885ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43152026-01-14T21:22:53.886ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43162026-01-14T21:22:53.892ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43172026-01-14T21:22:53.892ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43182026-01-14T21:22:53.892ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43192026-01-14T21:22:53.894ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43202026-01-14T21:22:53.900ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43212026-01-14T21:22:53.900ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43222026-01-14T21:22:53.900ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43232026-01-14T21:22:53.901ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43242026-01-14T21:22:53.907ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43252026-01-14T21:22:53.916ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43262026-01-14T21:22:53.925ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N014 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
43272026-01-14T21:22:53.925ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("fb758050-22b5-4004-83d0-0eab561238d6"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("fb758050-22b5-4004-83d0-0eab561238d6"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.885181Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.885181Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd80:d618:53ef::/64"), "rcgen": Number(1), "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}]) node_id = 14 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
43282026-01-14T21:22:53.931ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N015 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
43292026-01-14T21:22:53.932ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 15 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
43302026-01-14T21:22:53.939ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43312026-01-14T21:22:53.939ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43322026-01-14T21:22:53.939ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43332026-01-14T21:22:53.939ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43342026-01-14T21:22:53.940ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43352026-01-14T21:22:53.946ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43362026-01-14T21:22:53.946ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43372026-01-14T21:22:53.946ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43382026-01-14T21:22:53.947ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43392026-01-14T21:22:53.956ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43402026-01-14T21:22:53.956ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43412026-01-14T21:22:53.956ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43422026-01-14T21:22:53.957ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43432026-01-14T21:22:53.964ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43442026-01-14T21:22:53.974ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") }, key: 00aff646-da3a-4f86-8251-4f6cbe0a5c66, lookup_type: ById(00aff646-da3a-4f86-8251-4f6cbe0a5c66) } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43452026-01-14T21:22:53.974ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43462026-01-14T21:22:53.974ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43472026-01-14T21:22:53.975ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateSubnetRoute silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43482026-01-14T21:22:53.990ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N015 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
43492026-01-14T21:22:53.991ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Object {"key": String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}) node_id = 15 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
43502026-01-14T21:22:53.993ZDEBGtest_vpc_firewall (BackgroundTasks): activating background_task = reconfigurator_config_watcher iteration = 4 reason = Timeout
43512026-01-14T21:22:53.993ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig
43522026-01-14T21:22:53.993ZTRACtest_vpc_firewall (BackgroundTasks): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. } background_task = reconfigurator_config_watcher resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
43532026-01-14T21:22:53.993ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
43542026-01-14T21:22:53.993ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
43552026-01-14T21:22:53.994ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
43562026-01-14T21:22:53.999ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} }
43572026-01-14T21:22:54.009ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = BlueprintConfig result = Ok(())
43582026-01-14T21:22:54.010ZTRACtest_vpc_firewall (BackgroundTasks): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database
43592026-01-14T21:22:54.010ZDEBGtest_vpc_firewall (BackgroundTasks): roles background_task = reconfigurator_config_watcher roles = RoleSet { roles: {} }
43602026-01-14T21:22:54.010ZDEBGtest_vpc_firewall (BackgroundTasks): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) background_task = reconfigurator_config_watcher resource = Database result = Ok(())
43612026-01-14T21:22:54.017ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N016 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
43622026-01-14T21:22:54.017ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 16 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
43632026-01-14T21:22:54.021ZDEBGtest_vpc_firewall (BackgroundTasks): reconfigurator config load complete background_task = reconfigurator_config_watcher switches = Loaded(ReconfiguratorConfigView { version: 1, config: ReconfiguratorConfig { planner_enabled: false, planner_config: PlannerConfig { add_zones_with_mupdate_override: false }, tuf_repo_pruner_enabled: true }, time_modified: 2026-01-14T21:22:37.508570Z })
43642026-01-14T21:22:54.022ZDEBGtest_vpc_firewall (BackgroundTasks): activation complete background_task = reconfigurator_config_watcher elapsed = 28.881367ms iteration = 4 status = {"config_updated":false}
43652026-01-14T21:22:54.028ZDEBGtest_vpc_firewall (nexus): default firewall rules for vpc default rules = [VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 569bf9dc-8375-46b0-b51e-4bf610191e7d, name: Name(Name("allow-internal-inbound")), description: "allow inbound traffic to all instances within the VPC if originated within the VPC", time_created: 2026-01-14T21:22:54.027769196Z, time_modified: 2026-01-14T21:22:54.027769196Z, time_deleted: None }, vpc_id: e2b55e55-c331-4278-b8fe-0db988ff2f45, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: Some([VpcFirewallRuleHostFilter(Vpc(Name("default")))]), filter_ports: None, filter_protocols: None, action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: 341f9a27-ae72-47d8-a183-0a86c0b50136, name: Name(Name("allow-ssh")), description: "allow inbound TCP connections on port 22 from anywhere", time_created: 2026-01-14T21:22:54.027791049Z, time_modified: 2026-01-14T21:22:54.027791049Z, time_deleted: None }, vpc_id: e2b55e55-c331-4278-b8fe-0db988ff2f45, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: Some([L4PortRange(L4PortRange { first: L4Port(22), last: L4Port(22) })]), filter_protocols: Some([VpcFirewallRuleProtocol(Tcp)]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }, VpcFirewallRule { identity: VpcFirewallRuleIdentity { id: d77342cf-74d9-4c43-9655-781e9bdfc909, name: Name(Name("allow-icmp")), description: "allow inbound ICMP traffic from anywhere", time_created: 2026-01-14T21:22:54.027800418Z, time_modified: 2026-01-14T21:22:54.027800418Z, time_deleted: None }, vpc_id: e2b55e55-c331-4278-b8fe-0db988ff2f45, status: VpcFirewallRuleStatus(Enabled), direction: VpcFirewallRuleDirection(Inbound), targets: [VpcFirewallRuleTarget(Vpc(Name("default")))], filter_hosts: None, filter_ports: None, filter_protocols: Some([VpcFirewallRuleProtocol(Icmp(None))]), action: VpcFirewallRuleAction(Allow), priority: VpcFirewallRulePriority(VpcFirewallRulePriority(65534)) }]
43662026-01-14T21:22:54.028ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43672026-01-14T21:22:54.028ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43682026-01-14T21:22:54.028ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43692026-01-14T21:22:54.028ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43702026-01-14T21:22:54.029ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43712026-01-14T21:22:54.037ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43722026-01-14T21:22:54.037ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43732026-01-14T21:22:54.037ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43742026-01-14T21:22:54.044ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43752026-01-14T21:22:54.051ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43762026-01-14T21:22:54.051ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43772026-01-14T21:22:54.051ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43782026-01-14T21:22:54.052ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43792026-01-14T21:22:54.058ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43802026-01-14T21:22:54.069ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Modify actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43812026-01-14T21:22:54.070ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43822026-01-14T21:22:54.070ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43832026-01-14T21:22:54.071ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcUpdateFirewall silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43842026-01-14T21:22:54.191ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N016 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
43852026-01-14T21:22:54.191ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("569bf9dc-8375-46b0-b51e-4bf610191e7d"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-14T21:22:54.027769196Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027769196Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("341f9a27-ae72-47d8-a183-0a86c0b50136"), "name": String("allow-ssh"), "time_created": String("2026-01-14T21:22:54.027791049Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027791049Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("d77342cf-74d9-4c43-9655-781e9bdfc909"), "name": String("allow-icmp"), "time_created": String("2026-01-14T21:22:54.027800418Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027800418Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}]) node_id = 16 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
43862026-01-14T21:22:54.197ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N017 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
43872026-01-14T21:22:54.197ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 17 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
43882026-01-14T21:22:54.202ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43892026-01-14T21:22:54.203ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43902026-01-14T21:22:54.203ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43912026-01-14T21:22:54.203ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43922026-01-14T21:22:54.204ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43932026-01-14T21:22:54.213ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43942026-01-14T21:22:54.213ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43952026-01-14T21:22:54.213ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43962026-01-14T21:22:54.214ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43972026-01-14T21:22:54.220ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43982026-01-14T21:22:54.220ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
43992026-01-14T21:22:54.220ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44002026-01-14T21:22:54.221ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44012026-01-14T21:22:54.228ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44022026-01-14T21:22:54.242ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44032026-01-14T21:22:54.242ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44042026-01-14T21:22:54.242ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44052026-01-14T21:22:54.243ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44062026-01-14T21:22:54.249ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44072026-01-14T21:22:54.249ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44082026-01-14T21:22:54.250ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44092026-01-14T21:22:54.256ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44102026-01-14T21:22:54.256ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44112026-01-14T21:22:54.257ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44122026-01-14T21:22:54.407ZWARNtest_vpc_firewall (SagaExecutor): Default ip pool lookup failed: Object (of type ByOther("default unicast IP pool for current silo")) not found: ip-pool. Default gateway has no ip pool association authenticated = true saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcCreateGateway silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44132026-01-14T21:22:54.408ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N017 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
44142026-01-14T21:22:54.408ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Object {"key": String("e009feff-2962-49c4-a3ad-f9bca3c65812"), "lookup_type": Object {"ById": String("e009feff-2962-49c4-a3ad-f9bca3c65812")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 17 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
44152026-01-14T21:22:54.417ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N018 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
44162026-01-14T21:22:54.417ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 18 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
44172026-01-14T21:22:54.423ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44182026-01-14T21:22:54.424ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44192026-01-14T21:22:54.425ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44202026-01-14T21:22:54.434ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44212026-01-14T21:22:54.434ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44222026-01-14T21:22:54.437ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44232026-01-14T21:22:54.439ZINFOtest_vpc_firewall (oximeter-agent): refreshing list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:557
44242026-01-14T21:22:54.439ZDEBGtest_vpc_firewall (oximeter): client request body = None method = GET uri = http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
44252026-01-14T21:22:54.441ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
44262026-01-14T21:22:54.441ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending version = 1.0.0
44272026-01-14T21:22:54.441ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
44282026-01-14T21:22:54.441ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
44292026-01-14T21:22:54.443ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending user_builtin_id = 001de000-05e4-4000-8000-000000000002
44302026-01-14T21:22:54.444ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44312026-01-14T21:22:54.444ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44322026-01-14T21:22:54.445ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44332026-01-14T21:22:54.450ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ById(b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13) }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44342026-01-14T21:22:54.450ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44352026-01-14T21:22:54.450ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44362026-01-14T21:22:54.450ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44372026-01-14T21:22:54.451ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44382026-01-14T21:22:54.454ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 12968 local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 6eff10d0-e17e-4c54-958a-b0255d5de26b response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending
44392026-01-14T21:22:54.454ZDEBGtest_vpc_firewall (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?sort_by=id_ascending", status: 200, headers: {"content-type": "application/json", "x-request-id": "6eff10d0-e17e-4c54-958a-b0255d5de26b", "content-length": "405", "date": "Wed, 14 Jan 2026 21:22:54 GMT"} })
44402026-01-14T21:22:54.455ZDEBGtest_vpc_firewall (oximeter): client request body = None method = GET uri = http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
44412026-01-14T21:22:54.455ZTRACtest_vpc_firewall (dropshot_internal): incoming request local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 19059440-4807-4ef1-b7e0-98248b077799 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
44422026-01-14T21:22:54.455ZDEBGtest_vpc_firewall (dropshot_internal): determined request API version local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 19059440-4807-4ef1-b7e0-98248b077799 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D version = 1.0.0
44432026-01-14T21:22:54.456ZTRACtest_vpc_firewall (dropshot_internal): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 19059440-4807-4ef1-b7e0-98248b077799 resource = Database type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
44442026-01-14T21:22:54.456ZDEBGtest_vpc_firewall (dropshot_internal): roles authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 19059440-4807-4ef1-b7e0-98248b077799 roles = RoleSet { roles: {} } type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
44452026-01-14T21:22:54.457ZDEBGtest_vpc_firewall (dropshot_internal): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000002 (built_in_user), .. }) authenticated = true local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 19059440-4807-4ef1-b7e0-98248b077799 resource = Database result = Ok(()) type = user_builtin uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D user_builtin_id = 001de000-05e4-4000-8000-000000000002
44462026-01-14T21:22:54.459ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44472026-01-14T21:22:54.459ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44482026-01-14T21:22:54.459ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44492026-01-14T21:22:54.460ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44502026-01-14T21:22:54.465ZINFOtest_vpc_firewall (dropshot_internal): request completed latency_us = 9765 local_addr = 127.0.0.1:45286 method = GET remote_addr = 127.0.0.1:58081 req_id = 19059440-4807-4ef1-b7e0-98248b077799 response_code = 200 uri = /metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D
44512026-01-14T21:22:54.466ZDEBGtest_vpc_firewall (oximeter): client response result = Ok(Response { url: "http://127.0.0.1:45286/metrics/collectors/39e6175b-4df2-4730-b11d-cbc1e60a2e78/producers?page_token=eyJ2IjoidjEiLCJwYWdlX3N0YXJ0Ijp7InNvcnRfYnkiOiJpZF9hc2NlbmRpbmciLCJsYXN0X3NlZW4iOiJhNjQ1OGI3ZC04N2MzLTQ0ODMtYmU5Ni04NTRkODE0YzIwZGUifX0%3D", status: 200, headers: {"content-type": "application/json", "x-request-id": "19059440-4807-4ef1-b7e0-98248b077799", "content-length": "29", "date": "Wed, 14 Jan 2026 21:22:54 GMT"} })
44522026-01-14T21:22:54.466ZTRACtest_vpc_firewall (oximeter-agent): ignoring request to update existing metric producer, since the endpoint information is the same as the existing collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = 913233fe-92a8-4635-9572-183f495429c4
44532026-01-14T21:22:54.466ZDEBGtest_vpc_firewall (oximeter-agent): registered new metric producer address = [::1]:39192 collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de
44542026-01-14T21:22:54.466ZINFOtest_vpc_firewall (oximeter-agent): refreshed list of producers from Nexus collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 file = oximeter/collector/src/agent.rs:632 n_current_tasks = 2 n_pruned_tasks = 0
44552026-01-14T21:22:54.533ZTRACtest_vpc_firewall (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
44562026-01-14T21:22:54.534ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44572026-01-14T21:22:54.534ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44582026-01-14T21:22:54.534ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44592026-01-14T21:22:54.535ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44602026-01-14T21:22:54.537ZDEBGtest_vpc_firewall (collection-task): reporting oximeter self-collection statistics collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
44612026-01-14T21:22:54.538ZDEBGtest_vpc_firewall (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
44622026-01-14T21:22:54.539ZDEBGtest_vpc_firewall (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
44632026-01-14T21:22:54.542ZTRACtest_vpc_firewall (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
44642026-01-14T21:22:54.544ZDEBGtest_vpc_firewall (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
44652026-01-14T21:22:54.544ZTRACtest_vpc_firewall (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
44662026-01-14T21:22:54.544ZTRACtest_vpc_firewall (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
44672026-01-14T21:22:54.547ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44682026-01-14T21:22:54.557ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ById(b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13) }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44692026-01-14T21:22:54.557ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ById(b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13) }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44702026-01-14T21:22:54.557ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44712026-01-14T21:22:54.557ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44722026-01-14T21:22:54.557ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44732026-01-14T21:22:54.558ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44742026-01-14T21:22:54.578ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44752026-01-14T21:22:54.579ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44762026-01-14T21:22:54.579ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44772026-01-14T21:22:54.580ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44782026-01-14T21:22:54.588ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44792026-01-14T21:22:54.588ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44802026-01-14T21:22:54.588ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44812026-01-14T21:22:54.589ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44822026-01-14T21:22:54.597ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44832026-01-14T21:22:54.608ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = ListChildren actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ById(b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13) }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44842026-01-14T21:22:54.608ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44852026-01-14T21:22:54.608ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44862026-01-14T21:22:54.608ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
44872026-01-14T21:22:54.616ZDEBGtest_vpc_firewall (results-sink): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
44882026-01-14T21:22:54.616ZDEBGtest_vpc_firewall (results-sink-cluster): inserting 2 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
44892026-01-14T21:22:54.616ZDEBGtest_vpc_firewall (clickhouse-client): unrolling 2 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
44902026-01-14T21:22:54.618ZDEBGtest_vpc_firewall (clickhouse-client): retrieving timeseries schema from database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
44912026-01-14T21:22:54.618ZTRACtest_vpc_firewall (clickhouse-client): executing SQL query collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 sql = SELECT * FROM oximeter.timeseries_schema WHERE timeseries_name NOT IN ('collection_target:cpus_provisioned', 'collection_target:ram_provisioned', 'collection_target:virtual_disk_space_provisioned', 'http_service:request_latency_histogram', 'oximeter_collector:collections') FORMAT Native;
44922026-01-14T21:22:54.626ZTRACtest_vpc_firewall (clickhouse-client): no new timeseries schema in database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
44932026-01-14T21:22:54.626ZDEBGtest_vpc_firewall (clickhouse-client): new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 schema = TimeseriesSchema { timeseries_name: TimeseriesName("integration_target:integration_metric"), description: TimeseriesDescription { target: "", metric: "" }, field_schema: {FieldSchema { name: "metric_name", field_type: String, source: Metric, description: "" }, FieldSchema { name: "target_name", field_type: String, source: Target, description: "" }}, datum_type: I64, version: 1, authz_scope: Fleet, units: Count, created: 2026-01-14T21:22:54.618583616Z } timeseries_name = integration_target:integration_metric
44942026-01-14T21:22:54.626ZDEBGtest_vpc_firewall (clickhouse-client): inserting 1 new timeseries schema collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
44952026-01-14T21:22:54.627ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 6 n_rows = 1 sql = INSERT INTO oximeter.timeseries_schema FORMAT Native
44962026-01-14T21:22:54.635ZDEBGtest_vpc_firewall (nexus): resolved names for firewall rules instance_interfaces = {} subnet_interfaces = {} subnet_networks = {} vpc_interfaces = {}
44972026-01-14T21:22:54.635ZDEBGtest_vpc_firewall (nexus): resolved firewall rules for sled agents sled_agent_rules = []
44982026-01-14T21:22:54.635ZDEBGtest_vpc_firewall (nexus): resolved 0 rules for sleds
44992026-01-14T21:22:54.639ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_ipaddr FORMAT Native
45002026-01-14T21:22:54.648ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 2 table_name = fields_ipaddr
45012026-01-14T21:22:54.648ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 3 sql = INSERT INTO oximeter.fields_string FORMAT Native
45022026-01-14T21:22:54.656ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 3 table_name = fields_string
45032026-01-14T21:22:54.657ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_u16 FORMAT Native
45042026-01-14T21:22:54.669ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 2 table_name = fields_u16
45052026-01-14T21:22:54.669ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_uuid FORMAT Native
45062026-01-14T21:22:54.675ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 2 table_name = fields_uuid
45072026-01-14T21:22:54.675ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 5 n_rows = 1 sql = INSERT INTO oximeter.measurements_cumulativeu64 FORMAT Native
45082026-01-14T21:22:54.679ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 1 table_name = measurements_cumulativeu64
45092026-01-14T21:22:54.679ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
45102026-01-14T21:22:54.682ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 1 table_name = measurements_i64
45112026-01-14T21:22:54.684ZTRACtest_vpc_firewall (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
45122026-01-14T21:22:54.717ZWARNtest_vpc_firewall (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
45132026-01-14T21:22:54.776ZDEBGtest_vpc_firewall (nexus): resolved sleds for vpc default vpc_to_sled = []
45142026-01-14T21:22:54.777ZDEBGtest_vpc_firewall (nexus): sending firewall rules to sled agents
45152026-01-14T21:22:54.777ZINFOtest_vpc_firewall (nexus): updated firewall rules on 0 sleds
45162026-01-14T21:22:54.777ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45172026-01-14T21:22:54.777ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45182026-01-14T21:22:54.779ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_node = VpcNotifySleds silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
45192026-01-14T21:22:54.787ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N018 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
45202026-01-14T21:22:54.787ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 18 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
45212026-01-14T21:22:54.793ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N019 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
45222026-01-14T21:22:54.794ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 19 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
45232026-01-14T21:22:54.804ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N019 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
45242026-01-14T21:22:54.804ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 19 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
45252026-01-14T21:22:54.820ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N021 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
45262026-01-14T21:22:54.821ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 21 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
45272026-01-14T21:22:54.828ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N021 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
45282026-01-14T21:22:54.828ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 21 saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
45292026-01-14T21:22:54.833ZINFOtest_vpc_firewall (SEC): update for saga cached state new_state = Done saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 sec_id = 913233fe-92a8-4635-9572-183f495429c4
45302026-01-14T21:22:54.833ZINFOtest_vpc_firewall (SecStore): updating state new_state = done saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
45312026-01-14T21:22:54.899ZINFOtest_vpc_firewall (SEC): saga finished result = success saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
45322026-01-14T21:22:54.899ZINFOtest_vpc_firewall (SagaQuiesceHandle): tracked saga has finished saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560
45332026-01-14T21:22:54.900ZINFOtest_vpc_firewall (SagaExecutor): saga finished saga_id = b7f45611-f4a9-45cb-afab-fa043fabf560 saga_name = project-create saga_result = SagaResult { saga_id: b7f45611-f4a9-45cb-afab-fa043fabf560, saga_log: SagaLog { saga_id: b7f45611-f4a9-45cb-afab-fa043fabf560, unwinding: false, events: [N020 started, N020 succeeded, N000 started, N000 succeeded, N001 started, N001 succeeded, N002 started, N002 succeeded, N003 started, N003 succeeded, N004 started, N004 succeeded, N005 started, N005 succeeded, N006 started, N006 succeeded, N007 started, N007 succeeded, N008 started, N008 succeeded, N009 started, N009 succeeded, N010 started, N010 succeeded, N011 started, N011 succeeded, N012 started, N012 succeeded, N013 started, N013 succeeded, N014 started, N014 succeeded, N015 started, N015 succeeded, N016 started, N016 succeeded, N017 started, N017 succeeded, N018 started, N018 succeeded, N019 started, N019 succeeded, N021 started, N021 succeeded], node_status: {0: Succeeded(Array [Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "name": String("springfield-squidport"), "time_created": String("2026-01-14T21:22:53.330230Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.330230Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}]), 1: Succeeded(Object {"authz_project": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd80:d618:53ef::/48"), "name": String("default")}}), 2: Succeeded(Null), 3: Succeeded(String("e2b55e55-c331-4278-b8fe-0db988ff2f45")), 4: Succeeded(String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")), 5: Succeeded(String("183f06e0-c10f-44bb-960e-f856b4d0f52f")), 6: Succeeded(String("5b8dc003-44ca-4ade-bbff-62be25d55e7b")), 7: Succeeded(String("3e0c50f0-4bf2-444c-ad00-81c6efae5752")), 8: Succeeded(String("fb758050-22b5-4004-83d0-0eab561238d6")), 9: Succeeded(String("e009feff-2962-49c4-a3ad-f9bca3c65812")), 10: Succeeded(Array [Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("default"), "firewall_gen": Number(1), "identity": Object {"description": String("Default VPC"), "id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.508432Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.508432Z")}, "ipv6_prefix": String("fd80:d618:53ef::/48"), "project_id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "subnet_gen": Number(1), "system_router_id": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "vni": Number(3604191)}]), 11: Succeeded(Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 12: Succeeded(Null), 13: Succeeded(Null), 14: Succeeded(Array [Object {"key": String("fb758050-22b5-4004-83d0-0eab561238d6"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("fb758050-22b5-4004-83d0-0eab561238d6"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.885181Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.885181Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd80:d618:53ef::/64"), "rcgen": Number(1), "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}]), 15: Succeeded(Object {"key": String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}), 16: Succeeded(Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("569bf9dc-8375-46b0-b51e-4bf610191e7d"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-14T21:22:54.027769196Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027769196Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("341f9a27-ae72-47d8-a183-0a86c0b50136"), "name": String("allow-ssh"), "time_created": String("2026-01-14T21:22:54.027791049Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027791049Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("d77342cf-74d9-4c43-9655-781e9bdfc909"), "name": String("allow-icmp"), "time_created": String("2026-01-14T21:22:54.027800418Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027800418Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}]), 17: Succeeded(Object {"key": String("e009feff-2962-49c4-a3ad-f9bca3c65812"), "lookup_type": Object {"ById": String("e009feff-2962-49c4-a3ad-f9bca3c65812")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}), 18: Succeeded(Null), 19: Succeeded(Null), 20: Succeeded(Null), 21: Succeeded(Null)} }, kind: Ok(SagaResultOk { saga_output: Null, node_outputs: {"default_internet_gateway_id": String("e009feff-2962-49c4-a3ad-f9bca3c65812"), "default_subnet_id": String("fb758050-22b5-4004-83d0-0eab561238d6"), "default_v4_route_id": String("183f06e0-c10f-44bb-960e-f856b4d0f52f"), "default_v6_route_id": String("5b8dc003-44ca-4ade-bbff-62be25d55e7b"), "firewall": Array [Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Array [Object {"type": String("vpc"), "value": String("default")}], "filter_ports": Null, "filter_protocols": Null, "identity": Object {"description": String("allow inbound traffic to all instances within the VPC if originated within the VPC"), "id": String("569bf9dc-8375-46b0-b51e-4bf610191e7d"), "name": String("allow-internal-inbound"), "time_created": String("2026-01-14T21:22:54.027769196Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027769196Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Array [String("22")], "filter_protocols": Array [Object {"type": String("tcp")}], "identity": Object {"description": String("allow inbound TCP connections on port 22 from anywhere"), "id": String("341f9a27-ae72-47d8-a183-0a86c0b50136"), "name": String("allow-ssh"), "time_created": String("2026-01-14T21:22:54.027791049Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027791049Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}, Object {"action": String("allow"), "direction": String("inbound"), "filter_hosts": Null, "filter_ports": Null, "filter_protocols": Array [Object {"type": String("icmp"), "value": Null}], "identity": Object {"description": String("allow inbound ICMP traffic from anywhere"), "id": String("d77342cf-74d9-4c43-9655-781e9bdfc909"), "name": String("allow-icmp"), "time_created": String("2026-01-14T21:22:54.027800418Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:54.027800418Z")}, "priority": Number(65534), "status": String("enabled"), "targets": Array [Object {"type": String("vpc"), "value": String("default")}], "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}], "gateway": Object {"key": String("e009feff-2962-49c4-a3ad-f9bca3c65812"), "lookup_type": Object {"ById": String("e009feff-2962-49c4-a3ad-f9bca3c65812")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "no_result": Null, "project": Array [Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, Object {"identity": Object {"description": String("a pier"), "id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "name": String("springfield-squidport"), "time_created": String("2026-01-14T21:22:53.330230Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.330230Z")}, "rcgen": Number(1), "silo_id": String("001de000-5110-4000-8000-000000000000")}], "route": Object {"key": String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}}, "route4": Null, "route6": Null, "router": Object {"key": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "lookup_type": Object {"ById": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, "subnet": Array [Object {"key": String("fb758050-22b5-4004-83d0-0eab561238d6"), "lookup_type": Object {"ById": String("fb758050-22b5-4004-83d0-0eab561238d6")}, "parent": Object {"key": String("e2b55e55-c331-4278-b8fe-0db988ff2f45"), "lookup_type": Object {"ByName": String("default")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}, Object {"custom_router_id": Null, "identity": Object {"description": String("The default subnet for default"), "id": String("fb758050-22b5-4004-83d0-0eab561238d6"), "name": String("default"), "time_created": String("2026-01-14T21:22:53.885181Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:53.885181Z")}, "ipv4_block": String("172.30.0.0/22"), "ipv6_block": String("fd80:d618:53ef::/64"), "rcgen": Number(1), "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")}], "subnet_route_id": String("3e0c50f0-4bf2-444c-ad00-81c6efae5752"), "system_router_id": String("00aff646-da3a-4f86-8251-4f6cbe0a5c66"), "vpc": Null, "vpc_create_params": Object {"authz_project": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}, "serialized_authn": Object {"kind": Object {"Authenticated": Array [Object {"actor": Object {"SiloUser": Object {"silo_id": String("001de000-5110-4000-8000-000000000000"), "silo_user_id": String("001de000-05e4-4000-8000-000000004007")}}, "device_token_expiration": Null}, Object {"mapped_fleet_roles": Object {}}]}}, "vpc_create": Object {"description": String("Default VPC"), "dns_name": String("default"), "ipv6_prefix": String("fd80:d618:53ef::/48"), "name": String("default")}}, "vpc_id": String("e2b55e55-c331-4278-b8fe-0db988ff2f45")} }) }
45342026-01-14T21:22:54.901ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = AuditLog silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45352026-01-14T21:22:54.901ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45362026-01-14T21:22:54.902ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45372026-01-14T21:22:54.902ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45382026-01-14T21:22:54.902ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45392026-01-14T21:22:54.908ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45402026-01-14T21:22:54.913ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = AuditLog result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45412026-01-14T21:22:54.914ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45422026-01-14T21:22:54.914ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45432026-01-14T21:22:54.914ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/projects
45442026-01-14T21:22:54.985ZINFOtest_vpc_firewall (dropshot_external): request completed latency_us = 2416546 local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 95fd8489-597e-4c8b-9669-8e5a2e95071b response_code = 201 uri = /v1/projects
45452026-01-14T21:22:54.988ZINFOtest_vpc_firewall (external client test context): client received response status = 201
45462026-01-14T21:22:54.988ZINFOtest_vpc_firewall (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:43638/v1/vpcs/default?project=springfield-squidport
45472026-01-14T21:22:54.989ZTRACtest_vpc_firewall (dropshot_external): incoming request local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 uri = /v1/vpcs/default?project=springfield-squidport
45482026-01-14T21:22:54.989ZDEBGtest_vpc_firewall (dropshot_external): determined request API version local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 uri = /v1/vpcs/default?project=springfield-squidport version = 2025121200.0.0
45492026-01-14T21:22:54.989ZTRACtest_vpc_firewall (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 uri = /v1/vpcs/default?project=springfield-squidport
45502026-01-14T21:22:54.989ZDEBGtest_vpc_firewall (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs/default?project=springfield-squidport
45512026-01-14T21:22:54.989ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
45522026-01-14T21:22:54.989ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
45532026-01-14T21:22:54.990ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
45542026-01-14T21:22:54.996ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
45552026-01-14T21:22:54.996ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
45562026-01-14T21:22:54.998ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
45572026-01-14T21:22:55.004ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
45582026-01-14T21:22:55.005ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
45592026-01-14T21:22:55.005ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
45602026-01-14T21:22:55.005ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
45612026-01-14T21:22:55.006ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
45622026-01-14T21:22:55.011ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
45632026-01-14T21:22:55.011ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
45642026-01-14T21:22:55.011ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
45652026-01-14T21:22:55.012ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
45662026-01-14T21:22:55.018ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
45672026-01-14T21:22:55.022ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
45682026-01-14T21:22:55.022ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
45692026-01-14T21:22:55.022ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
45702026-01-14T21:22:55.022ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
45712026-01-14T21:22:55.027ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
45722026-01-14T21:22:55.027ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
45732026-01-14T21:22:55.027ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
45742026-01-14T21:22:55.027ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
45752026-01-14T21:22:55.028ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
45762026-01-14T21:22:55.034ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
45772026-01-14T21:22:55.034ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
45782026-01-14T21:22:55.034ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
45792026-01-14T21:22:55.035ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
45802026-01-14T21:22:55.039ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
45812026-01-14T21:22:55.043ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
45822026-01-14T21:22:55.044ZTRACtest_vpc_firewall (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 uri = /v1/vpcs/default?project=springfield-squidport
45832026-01-14T21:22:55.044ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45842026-01-14T21:22:55.044ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45852026-01-14T21:22:55.044ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45862026-01-14T21:22:55.049ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45872026-01-14T21:22:55.049ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45882026-01-14T21:22:55.051ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45892026-01-14T21:22:55.057ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45902026-01-14T21:22:55.058ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45912026-01-14T21:22:55.059ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45922026-01-14T21:22:55.065ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45932026-01-14T21:22:55.065ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45942026-01-14T21:22:55.065ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45952026-01-14T21:22:55.065ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45962026-01-14T21:22:55.066ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45972026-01-14T21:22:55.072ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45982026-01-14T21:22:55.072ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
45992026-01-14T21:22:55.072ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
46002026-01-14T21:22:55.074ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
46012026-01-14T21:22:55.081ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
46022026-01-14T21:22:55.081ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
46032026-01-14T21:22:55.081ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
46042026-01-14T21:22:55.082ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
46052026-01-14T21:22:55.090ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
46062026-01-14T21:22:55.101ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs/default?project=springfield-squidport
46072026-01-14T21:22:55.101ZINFOtest_vpc_firewall (dropshot_external): request completed latency_us = 112776 local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = fc1445ef-f08a-4f20-aee6-ac100ac146e7 response_code = 200 uri = /v1/vpcs/default?project=springfield-squidport
46082026-01-14T21:22:55.102ZINFOtest_vpc_firewall (external client test context): client received response status = 200
46092026-01-14T21:22:55.103ZINFOtest_vpc_firewall (external client test context): client request body = Body { inner: BoxBody } method = GET uri = http://127.0.0.1:43638/v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46102026-01-14T21:22:55.104ZTRACtest_vpc_firewall (dropshot_external): incoming request local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46112026-01-14T21:22:55.104ZDEBGtest_vpc_firewall (dropshot_external): determined request API version local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport version = 2025121200.0.0
46122026-01-14T21:22:55.104ZTRACtest_vpc_firewall (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46132026-01-14T21:22:55.104ZDEBGtest_vpc_firewall (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46142026-01-14T21:22:55.104ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46152026-01-14T21:22:55.104ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
46162026-01-14T21:22:55.105ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
46172026-01-14T21:22:55.112ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46182026-01-14T21:22:55.112ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
46192026-01-14T21:22:55.113ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
46202026-01-14T21:22:55.133ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
46212026-01-14T21:22:55.133ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
46222026-01-14T21:22:55.133ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46232026-01-14T21:22:55.133ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
46242026-01-14T21:22:55.134ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
46252026-01-14T21:22:55.139ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
46262026-01-14T21:22:55.139ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46272026-01-14T21:22:55.140ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
46282026-01-14T21:22:55.141ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
46292026-01-14T21:22:55.147ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46302026-01-14T21:22:55.152ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
46312026-01-14T21:22:55.152ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46322026-01-14T21:22:55.152ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
46332026-01-14T21:22:55.153ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
46342026-01-14T21:22:55.158ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
46352026-01-14T21:22:55.158ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
46362026-01-14T21:22:55.158ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46372026-01-14T21:22:55.158ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
46382026-01-14T21:22:55.159ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
46392026-01-14T21:22:55.164ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
46402026-01-14T21:22:55.164ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46412026-01-14T21:22:55.164ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
46422026-01-14T21:22:55.165ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
46432026-01-14T21:22:55.175ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
46442026-01-14T21:22:55.175ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
46452026-01-14T21:22:55.175ZTRACtest_vpc_firewall (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46462026-01-14T21:22:55.175ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46472026-01-14T21:22:55.175ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46482026-01-14T21:22:55.176ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46492026-01-14T21:22:55.182ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46502026-01-14T21:22:55.182ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46512026-01-14T21:22:55.182ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46522026-01-14T21:22:55.188ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46532026-01-14T21:22:55.188ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46542026-01-14T21:22:55.190ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46552026-01-14T21:22:55.195ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46562026-01-14T21:22:55.196ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46572026-01-14T21:22:55.196ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46582026-01-14T21:22:55.196ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46592026-01-14T21:22:55.197ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46602026-01-14T21:22:55.207ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46612026-01-14T21:22:55.207ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46622026-01-14T21:22:55.207ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46632026-01-14T21:22:55.208ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46642026-01-14T21:22:55.214ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46652026-01-14T21:22:55.214ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46662026-01-14T21:22:55.215ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46672026-01-14T21:22:55.217ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46682026-01-14T21:22:55.224ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46692026-01-14T21:22:55.237ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46702026-01-14T21:22:55.237ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46712026-01-14T21:22:55.237ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46722026-01-14T21:22:55.237ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46732026-01-14T21:22:55.237ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46742026-01-14T21:22:55.238ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46752026-01-14T21:22:55.245ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46762026-01-14T21:22:55.245ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46772026-01-14T21:22:55.245ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46782026-01-14T21:22:55.246ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46792026-01-14T21:22:55.251ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46802026-01-14T21:22:55.251ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46812026-01-14T21:22:55.252ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46822026-01-14T21:22:55.252ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46832026-01-14T21:22:55.259ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46842026-01-14T21:22:55.269ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Read actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: e2b55e55-c331-4278-b8fe-0db988ff2f45, lookup_type: ByName("default") } result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46852026-01-14T21:22:55.269ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46862026-01-14T21:22:55.269ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46872026-01-14T21:22:55.270ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46882026-01-14T21:22:55.277ZINFOtest_vpc_firewall (dropshot_external): request completed latency_us = 173484 local_addr = 127.0.0.1:43638 method = GET remote_addr = 127.0.0.1:64367 req_id = 9f772414-f4b3-4ebd-abb5-6801a6a8845d response_code = 200 uri = /v1/vpc-firewall-rules?vpc=default&project=springfield-squidport
46892026-01-14T21:22:55.278ZINFOtest_vpc_firewall (external client test context): client received response status = 200
46902026-01-14T21:22:55.279ZINFOtest_vpc_firewall (external client test context): client request body = Body { inner: BoxBody } method = POST uri = http://127.0.0.1:43638/v1/vpcs?project=springfield-squidport
46912026-01-14T21:22:55.279ZTRACtest_vpc_firewall (dropshot_external): incoming request local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f uri = /v1/vpcs?project=springfield-squidport
46922026-01-14T21:22:55.279ZDEBGtest_vpc_firewall (dropshot_external): determined request API version local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f uri = /v1/vpcs?project=springfield-squidport version = 2025121200.0.0
46932026-01-14T21:22:55.280ZTRACtest_vpc_firewall (dropshot_external): authn: trying SchemeName("spoof") local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f uri = /v1/vpcs?project=springfield-squidport
46942026-01-14T21:22:55.280ZDEBGtest_vpc_firewall (dropshot_external): looking up silo for user local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f silo_user_id = 001de000-05e4-4000-8000-000000004007 uri = /v1/vpcs?project=springfield-squidport
46952026-01-14T21:22:55.280ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46962026-01-14T21:22:55.280ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
46972026-01-14T21:22:55.281ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
46982026-01-14T21:22:55.286ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
46992026-01-14T21:22:55.286ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
47002026-01-14T21:22:55.288ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47012026-01-14T21:22:55.293ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) }
47022026-01-14T21:22:55.293ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
47032026-01-14T21:22:55.293ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47042026-01-14T21:22:55.293ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
47052026-01-14T21:22:55.294ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47062026-01-14T21:22:55.305ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
47072026-01-14T21:22:55.305ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47082026-01-14T21:22:55.306ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
47092026-01-14T21:22:55.311ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47102026-01-14T21:22:55.321ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
47112026-01-14T21:22:55.327ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = SiloUser { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: 001de000-05e4-4000-8000-000000004007 (silo_user), lookup_type: ById(001de000-05e4-4000-8000-000000004007) } result = Ok(())
47122026-01-14T21:22:55.327ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47132026-01-14T21:22:55.328ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
47142026-01-14T21:22:55.328ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47152026-01-14T21:22:55.335ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }
47162026-01-14T21:22:55.335ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo
47172026-01-14T21:22:55.335ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47182026-01-14T21:22:55.335ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
47192026-01-14T21:22:55.336ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47202026-01-14T21:22:55.341ZTRACtest_vpc_firewall (ExternalAuthn): loading roles actor = Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. } resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet
47212026-01-14T21:22:55.341ZTRACtest_vpc_firewall (ExternalAuthn): authorize begin action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database
47222026-01-14T21:22:55.341ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {} }
47232026-01-14T21:22:55.342ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Query actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Database result = Ok(())
47242026-01-14T21:22:55.350ZDEBGtest_vpc_firewall (ExternalAuthn): roles roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "external-authenticator")} }
47252026-01-14T21:22:55.355ZDEBGtest_vpc_firewall (ExternalAuthn): authorize result action = Read actor = Some(Actor::UserBuiltin { user_builtin_id: 001de000-05e4-4000-8000-000000000003 (built_in_user), .. }) resource = Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) } result = Ok(())
47262026-01-14T21:22:55.355ZTRACtest_vpc_firewall (dropshot_external): authn result: Ok(Context { kind: Authenticated(Details { actor: Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }, device_token_expiration: None }, Some(SiloAuthnPolicy { mapped_fleet_roles: {} })), schemes_tried: [SchemeName("spoof")] }) local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f uri = /v1/vpcs?project=springfield-squidport
47272026-01-14T21:22:55.355ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47282026-01-14T21:22:55.355ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47292026-01-14T21:22:55.355ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47302026-01-14T21:22:55.359ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47312026-01-14T21:22:55.359ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47322026-01-14T21:22:55.360ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47332026-01-14T21:22:55.365ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47342026-01-14T21:22:55.365ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47352026-01-14T21:22:55.365ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47362026-01-14T21:22:55.365ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47372026-01-14T21:22:55.366ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47382026-01-14T21:22:55.371ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47392026-01-14T21:22:55.372ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47402026-01-14T21:22:55.372ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47412026-01-14T21:22:55.373ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47422026-01-14T21:22:55.380ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47432026-01-14T21:22:55.380ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47442026-01-14T21:22:55.389ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47452026-01-14T21:22:55.389ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47462026-01-14T21:22:55.395ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47472026-01-14T21:22:55.409ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") } result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47482026-01-14T21:22:55.409ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = VpcList(Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47492026-01-14T21:22:55.410ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47502026-01-14T21:22:55.410ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47512026-01-14T21:22:55.410ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47522026-01-14T21:22:55.411ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47532026-01-14T21:22:55.418ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47542026-01-14T21:22:55.418ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47552026-01-14T21:22:55.419ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47562026-01-14T21:22:55.419ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47572026-01-14T21:22:55.425ZTRACtest_vpc_firewall (dropshot_external): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47582026-01-14T21:22:55.425ZTRACtest_vpc_firewall (dropshot_external): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47592026-01-14T21:22:55.425ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47602026-01-14T21:22:55.426ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = Database result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47612026-01-14T21:22:55.432ZDEBGtest_vpc_firewall (dropshot_external): roles authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47622026-01-14T21:22:55.439ZDEBGtest_vpc_firewall (dropshot_external): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true local_addr = 127.0.0.1:43638 method = POST remote_addr = 127.0.0.1:64367 req_id = 5d734392-a09b-4322-91c7-4cd6926ba91f resource = VpcList(Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }) result = Ok(()) silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user uri = /v1/vpcs?project=springfield-squidport
47632026-01-14T21:22:55.439ZINFOtest_vpc_firewall (SagaQuiesceHandle): tracking newly created saga saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47642026-01-14T21:22:55.439ZINFOtest_vpc_firewall (SagaExecutor): preparing saga saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create
47652026-01-14T21:22:55.440ZINFOtest_vpc_firewall (SEC): saga create dag = {"end_node":17,"graph":{"edge_property":"directed","edges":[[0,1,null],[1,2,null],[2,3,null],[3,4,null],[4,5,null],[5,6,null],[6,7,null],[7,8,null],[8,9,null],[9,10,null],[10,11,null],[11,12,null],[12,13,null],[13,14,null],[14,15,null],[16,0,null],[15,17,null]],"node_holes":[],"nodes":[{"Action":{"action_name":"common.uuid_generate","label":"GenerateVpcId","name":"vpc_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSystemRouterId","name":"system_router_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV4RouteId","name":"default_v4_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultV6RouteId","name":"default_v6_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateSubnetRouteId","name":"subnet_route_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultSubnetId","name":"default_subnet_id"}},{"Action":{"action_name":"common.uuid_generate","label":"GenerateDefaultInternetGatewayId","name":"default_internet_gateway_id"}},{"Action":{"action_name":"vpc_create.vpc_create_vpc","label":"VpcCreateVpc","name":"vpc"}},{"Action":{"action_name":"vpc_create.vpc_create_router","label":"VpcCreateRouter","name":"router"}},{"Action":{"action_name":"vpc_create.vpc_create_v4_route","label":"VpcCreateV4Route","name":"route4"}},{"Action":{"action_name":"vpc_create.vpc_create_v6_route","label":"VpcCreateV6Route","name":"route6"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet","label":"VpcCreateSubnet","name":"subnet"}},{"Action":{"action_name":"vpc_create.vpc_create_subnet_route","label":"VpcCreateSubnetRoute","name":"route"}},{"Action":{"action_name":"vpc_create.vpc_update_firewall","label":"VpcUpdateFirewall","name":"firewall"}},{"Action":{"action_name":"vpc_create.vpc_create_gateway","label":"VpcCreateGateway","name":"gateway"}},{"Action":{"action_name":"vpc_create.vpc_notify_sleds","label":"VpcNotifySleds","name":"no_result"}},{"Start":{"params":{"authz_project":{"key":"b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13","lookup_type":{"ByName":"springfield-squidport"},"parent":{"key":"001de000-5110-4000-8000-000000000000","lookup_type":{"ById":"001de000-5110-4000-8000-000000000000"},"parent":null}},"serialized_authn":{"kind":{"Authenticated":[{"actor":{"SiloUser":{"silo_id":"001de000-5110-4000-8000-000000000000","silo_user_id":"001de000-05e4-4000-8000-000000004007"}},"device_token_expiration":null},{"mapped_fleet_roles":{}}]}},"vpc_create":{"description":"vpc description","dns_name":"abc","ipv6_prefix":null,"name":"second-vpc"}}}},"End"]},"saga_name":"vpc-create","start_node":16} saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
47662026-01-14T21:22:55.440ZINFOtest_vpc_firewall (SecStore): creating saga saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create
47672026-01-14T21:22:55.467ZDEBGtest_vpc_firewall (collection-task): sent timer-based collection request to the collection task collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
47682026-01-14T21:22:55.467ZDEBGtest_vpc_firewall (collection-task): collecting from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
47692026-01-14T21:22:55.471ZTRACtest_vpc_firewall (collection-task): sent collection request to producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
47702026-01-14T21:22:55.472ZDEBGtest_vpc_firewall (collection-task): collected results from producer collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 n_results = 1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
47712026-01-14T21:22:55.472ZTRACtest_vpc_firewall (collection-task): forwarded results to main collection loop collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
47722026-01-14T21:22:55.473ZTRACtest_vpc_firewall (collection-task): top of inner collection loop, waiting for next request collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 producer_id = a6458b7d-87c3-4483-be96-854d814c20de producer_ip = ::1 producer_port = 39192
47732026-01-14T21:22:55.520ZINFOtest_vpc_firewall (SagaExecutor): starting saga saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create
47742026-01-14T21:22:55.521ZINFOtest_vpc_firewall (SEC): saga start saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create sec_id = 913233fe-92a8-4635-9572-183f495429c4
47752026-01-14T21:22:55.521ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N016 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
47762026-01-14T21:22:55.521ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 16 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47772026-01-14T21:22:55.529ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N016 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
47782026-01-14T21:22:55.529ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 16 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47792026-01-14T21:22:55.537ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N000 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
47802026-01-14T21:22:55.538ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 0 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47812026-01-14T21:22:55.543ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N000 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
47822026-01-14T21:22:55.543ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("6fed4476-e17d-4fb5-9302-d01707840fb5")) node_id = 0 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47832026-01-14T21:22:55.548ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N001 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
47842026-01-14T21:22:55.548ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 1 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47852026-01-14T21:22:55.554ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N001 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
47862026-01-14T21:22:55.559ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("b41a4399-83be-4b0e-8058-6d6a8ee1717b")) node_id = 1 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47872026-01-14T21:22:55.567ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N002 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
47882026-01-14T21:22:55.567ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 2 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47892026-01-14T21:22:55.576ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N002 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
47902026-01-14T21:22:55.576ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("51492747-fc37-4fa3-90bb-7490f6d8bd0d")) node_id = 2 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47912026-01-14T21:22:55.593ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N003 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
47922026-01-14T21:22:55.593ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 3 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47932026-01-14T21:22:55.616ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N003 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
47942026-01-14T21:22:55.616ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("88a08621-e288-4ab7-91e3-c239a412ee8e")) node_id = 3 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
47952026-01-14T21:22:55.618ZDEBGtest_vpc_firewall (results-sink): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
47962026-01-14T21:22:55.619ZDEBGtest_vpc_firewall (results-sink-cluster): inserting 1 samples into database collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
47972026-01-14T21:22:55.619ZDEBGtest_vpc_firewall (clickhouse-client): unrolling 1 total samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26
47982026-01-14T21:22:55.620ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 2 sql = INSERT INTO oximeter.fields_string FORMAT Native
47992026-01-14T21:22:55.625ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N004 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
48002026-01-14T21:22:55.625ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 4 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48012026-01-14T21:22:55.631ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 2 table_name = fields_string
48022026-01-14T21:22:55.631ZTRACtest_vpc_firewall (clickhouse-client): inserting data collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_columns = 4 n_rows = 1 sql = INSERT INTO oximeter.measurements_i64 FORMAT Native
48032026-01-14T21:22:55.639ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N004 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
48042026-01-14T21:22:55.639ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("106604e5-ccae-44af-85f8-9e44c7e16611")) node_id = 4 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48052026-01-14T21:22:55.644ZDEBGtest_vpc_firewall (clickhouse-client): inserted rows into table collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 id = a3c2962f-9f30-41f7-b4cb-3729ecd26b26 n_rows = 1 table_name = measurements_i64
48062026-01-14T21:22:55.644ZTRACtest_vpc_firewall (results-sink): successfully inserted samples collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1
48072026-01-14T21:22:55.650ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N005 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
48082026-01-14T21:22:55.650ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 5 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48092026-01-14T21:22:55.656ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N005 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
48102026-01-14T21:22:55.656ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("87e5d9ed-f859-4592-a712-8e29898c5130")) node_id = 5 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48112026-01-14T21:22:55.666ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N006 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
48122026-01-14T21:22:55.666ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 6 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48132026-01-14T21:22:55.678ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N006 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
48142026-01-14T21:22:55.678ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(String("e9b958da-5bdb-4bba-812e-ef921a9dd910")) node_id = 6 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48152026-01-14T21:22:55.690ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N007 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
48162026-01-14T21:22:55.690ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 7 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48172026-01-14T21:22:55.699ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48182026-01-14T21:22:55.700ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48192026-01-14T21:22:55.700ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48202026-01-14T21:22:55.700ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48212026-01-14T21:22:55.701ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48222026-01-14T21:22:55.719ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48232026-01-14T21:22:55.719ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48242026-01-14T21:22:55.719ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48252026-01-14T21:22:55.719ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48262026-01-14T21:22:55.721ZWARNtest_vpc_firewall (results-sink-cluster): failed to insert some results into metric DB collector_id = 39e6175b-4df2-4730-b11d-cbc1e60a2e78 collector_ip = ::1 error = Failed to check out connection to database: No backends found for this service file = oximeter/collector/src/results_sink.rs:92
48272026-01-14T21:22:55.727ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48282026-01-14T21:22:55.727ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48292026-01-14T21:22:55.727ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48302026-01-14T21:22:55.728ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48312026-01-14T21:22:55.739ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48322026-01-14T21:22:55.749ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") } result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48332026-01-14T21:22:55.749ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48342026-01-14T21:22:55.749ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48352026-01-14T21:22:55.750ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateVpc silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48362026-01-14T21:22:55.760ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N007 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
48372026-01-14T21:22:55.760ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Array [Object {"key": String("6fed4476-e17d-4fb5-9302-d01707840fb5"), "lookup_type": Object {"ByName": String("second-vpc")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}, Object {"dns_name": String("abc"), "firewall_gen": Number(1), "identity": Object {"description": String("vpc description"), "id": String("6fed4476-e17d-4fb5-9302-d01707840fb5"), "name": String("second-vpc"), "time_created": String("2026-01-14T21:22:55.699765Z"), "time_deleted": Null, "time_modified": String("2026-01-14T21:22:55.699765Z")}, "ipv6_prefix": String("fdef:491f:9a4e::/48"), "project_id": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "subnet_gen": Number(1), "system_router_id": String("b41a4399-83be-4b0e-8058-6d6a8ee1717b"), "vni": Number(2190405)}]) node_id = 7 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48382026-01-14T21:22:55.766ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N008 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
48392026-01-14T21:22:55.767ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 8 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48402026-01-14T21:22:55.774ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: 6fed4476-e17d-4fb5-9302-d01707840fb5, lookup_type: ByName("second-vpc") } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48412026-01-14T21:22:55.774ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48422026-01-14T21:22:55.774ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48432026-01-14T21:22:55.774ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48442026-01-14T21:22:55.776ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48452026-01-14T21:22:55.783ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48462026-01-14T21:22:55.783ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48472026-01-14T21:22:55.783ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48482026-01-14T21:22:55.784ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48492026-01-14T21:22:55.789ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48502026-01-14T21:22:55.790ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48512026-01-14T21:22:55.790ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48522026-01-14T21:22:55.791ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48532026-01-14T21:22:55.798ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48542026-01-14T21:22:55.809ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: 6fed4476-e17d-4fb5-9302-d01707840fb5, lookup_type: ByName("second-vpc") } result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48552026-01-14T21:22:55.810ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48562026-01-14T21:22:55.810ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48572026-01-14T21:22:55.810ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateRouter silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48582026-01-14T21:22:55.817ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N008 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
48592026-01-14T21:22:55.818ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Object {"key": String("b41a4399-83be-4b0e-8058-6d6a8ee1717b"), "lookup_type": Object {"ById": String("b41a4399-83be-4b0e-8058-6d6a8ee1717b")}, "parent": Object {"key": String("6fed4476-e17d-4fb5-9302-d01707840fb5"), "lookup_type": Object {"ByName": String("second-vpc")}, "parent": Object {"key": String("b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13"), "lookup_type": Object {"ByName": String("springfield-squidport")}, "parent": Object {"key": String("001de000-5110-4000-8000-000000000000"), "lookup_type": Object {"ById": String("001de000-5110-4000-8000-000000000000")}, "parent": Null}}}}) node_id = 8 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48602026-01-14T21:22:55.825ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N009 started sec_id = 913233fe-92a8-4635-9572-183f495429c4
48612026-01-14T21:22:55.825ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Started node_id = 9 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc
48622026-01-14T21:22:55.834ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: 6fed4476-e17d-4fb5-9302-d01707840fb5, lookup_type: ByName("second-vpc") }, key: b41a4399-83be-4b0e-8058-6d6a8ee1717b, lookup_type: ById(b41a4399-83be-4b0e-8058-6d6a8ee1717b) } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48632026-01-14T21:22:55.834ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13 resource_type = Project saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48642026-01-14T21:22:55.834ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48652026-01-14T21:22:55.834ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48662026-01-14T21:22:55.836ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48672026-01-14T21:22:55.842ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-5110-4000-8000-000000000000 resource_type = Silo saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48682026-01-14T21:22:55.842ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48692026-01-14T21:22:55.842ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48702026-01-14T21:22:55.843ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48712026-01-14T21:22:55.848ZTRACtest_vpc_firewall (SagaExecutor): loading roles actor = Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. } authenticated = true resource_id = 001de000-1334-4000-8000-000000000000 resource_type = Fleet saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48722026-01-14T21:22:55.849ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48732026-01-14T21:22:55.849ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48742026-01-14T21:22:55.849ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48752026-01-14T21:22:55.856ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {(Fleet, 001de000-1334-4000-8000-000000000000, "admin"), (Silo, 001de000-5110-4000-8000-000000000000, "admin")} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48762026-01-14T21:22:55.865ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = CreateChild actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = VpcRouter { parent: Vpc { parent: Project { parent: Silo { parent: Fleet, key: 001de000-5110-4000-8000-000000000000, lookup_type: ById(001de000-5110-4000-8000-000000000000) }, key: b0c694ab-1ee3-4ee1-ab7d-fbc2220dbe13, lookup_type: ByName("springfield-squidport") }, key: 6fed4476-e17d-4fb5-9302-d01707840fb5, lookup_type: ByName("second-vpc") }, key: b41a4399-83be-4b0e-8058-6d6a8ee1717b, lookup_type: ById(b41a4399-83be-4b0e-8058-6d6a8ee1717b) } result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48772026-01-14T21:22:55.866ZTRACtest_vpc_firewall (SagaExecutor): authorize begin action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48782026-01-14T21:22:55.866ZDEBGtest_vpc_firewall (SagaExecutor): roles authenticated = true roles = RoleSet { roles: {} } saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48792026-01-14T21:22:55.866ZDEBGtest_vpc_firewall (SagaExecutor): authorize result action = Query actor = Some(Actor::SiloUser { silo_user_id: 001de000-05e4-4000-8000-000000004007 (silo_user), silo_id: 001de000-5110-4000-8000-000000000000, .. }) authenticated = true resource = Database result = Ok(()) saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc saga_name = vpc-create saga_node = VpcCreateV4Route silo_id = 001de000-5110-4000-8000-000000000000 silo_user_id = 001de000-05e4-4000-8000-000000004007 type = silo_user
48802026-01-14T21:22:55.876ZDEBGtest_vpc_firewall (SEC): saga log event new_state = N009 succeeded sec_id = 913233fe-92a8-4635-9572-183f495429c4
48812026-01-14T21:22:55.876ZDEBGtest_vpc_firewall (SecStore): recording saga event event_type = Succeeded(Null) node_id = 9 saga_id = b82d0d9d-3eab-4a70-af2d-dcfab21ab7fc