Max level shown:
12026-01-14T21:22:37.565ZINFOtest_vpc_firewall: setting up simulated sidecar slot = sidecar 0
22026-01-14T21:22:37.565ZINFOtest_vpc_firewall: simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:42263 slot = sidecar 0 type = simulated
32026-01-14T21:22:37.565ZINFOtest_vpc_firewall: simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:52072 slot = sidecar 0 type = simulated
42026-01-14T21:22:37.565ZINFOtest_vpc_firewall (ereport-sim): simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:64631 slot = sidecar 0 type = simulated
52026-01-14T21:22:37.565ZINFOtest_vpc_firewall (ereport-sim): simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:63944 slot = sidecar 0 type = simulated
62026-01-14T21:22:37.565ZINFOtest_vpc_firewall (ereport-sim): configuring sim ereports metadata = {"baseboard_part_number": String("SimSidecarSp"), "baseboard_serial_number": String("SimSidecar0"), "hubris_archive_id": String("asdfasdfasdf")} n_ereports = 1 restart_id = 0d3e464a-666e-4687-976f-90e31238be8b slot = sidecar 0
72026-01-14T21:22:37.565ZINFOtest_vpc_firewall: setting up simulated sidecar slot = sidecar 1
82026-01-14T21:22:37.565ZINFOtest_vpc_firewall: simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:32904 slot = sidecar 1 type = simulated
92026-01-14T21:22:37.565ZINFOtest_vpc_firewall: simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:63596 slot = sidecar 1 type = simulated
102026-01-14T21:22:37.565ZINFOtest_vpc_firewall (ereport-sim): simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:44780 slot = sidecar 1 type = simulated
112026-01-14T21:22:37.566ZINFOtest_vpc_firewall (ereport-sim): simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:42849 slot = sidecar 1 type = simulated
122026-01-14T21:22:37.566ZINFOtest_vpc_firewall (ereport-sim): configuring sim ereports metadata = {"baseboard_part_number": String("SimSidecarSp"), "baseboard_serial_number": String("SimSidecar1"), "hubris_archive_id": String("asdfasdfasdf")} n_ereports = 0 restart_id = dd866547-794b-4bcc-93b2-656b13d29f97 slot = sidecar 1
132026-01-14T21:22:37.566ZINFOtest_vpc_firewall: setting up simulated gimlet slot = gimlet 0
142026-01-14T21:22:37.566ZINFOtest_vpc_firewall: simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:37600 slot = gimlet 0 type = simulated
152026-01-14T21:22:37.566ZINFOtest_vpc_firewall: simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:45944 slot = gimlet 0 type = simulated
162026-01-14T21:22:37.566ZINFOtest_vpc_firewall (ereport-sim): simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:39692 slot = gimlet 0 type = simulated
172026-01-14T21:22:37.566ZINFOtest_vpc_firewall (ereport-sim): simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:42390 slot = gimlet 0 type = simulated
182026-01-14T21:22:37.566ZINFOtest_vpc_firewall (ereport-sim): configuring sim ereports metadata = {"baseboard_part_number": String("SimGimletSp"), "baseboard_serial_number": String("SimGimlet00"), "hubris_archive_id": String("ffffffff"), "hubris_version": String("0.0.2")} n_ereports = 5 restart_id = af1ebf85-36ba-4c31-bbec-b9825d6d9d8b slot = gimlet 0
192026-01-14T21:22:37.566ZINFOtest_vpc_firewall (SpComponent { id: "sp3-host-cpu" }): bound fake serial console to TCP port addr = [::1]:0 slot = gimlet 0
202026-01-14T21:22:37.566ZINFOtest_vpc_firewall: setting up simulated gimlet slot = gimlet 1
212026-01-14T21:22:37.566ZINFOtest_vpc_firewall: simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:54292 slot = gimlet 1 type = simulated
222026-01-14T21:22:37.566ZINFOtest_vpc_firewall: simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:48255 slot = gimlet 1 type = simulated
232026-01-14T21:22:37.566ZINFOtest_vpc_firewall (ereport-sim): simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:56922 slot = gimlet 1 type = simulated
242026-01-14T21:22:37.566ZINFOtest_vpc_firewall (ereport-sim): simulated SP UDP socket bound bind_addr = [::1]:0 local_addr = [::1]:35358 slot = gimlet 1 type = simulated
252026-01-14T21:22:37.566ZINFOtest_vpc_firewall (ereport-sim): configuring sim ereports metadata = {"baseboard_part_number": String("SimGimletSp"), "baseboard_serial_number": String("SimGimlet01"), "hubris_archive_id": String("ffffffff"), "hubris_version": String("0.0.2")} n_ereports = 1 restart_id = 55e30cc7-a109-492f-aca9-735ed725df3c slot = gimlet 1
262026-01-14T21:22:37.566ZINFOtest_vpc_firewall (SpComponent { id: "sp3-host-cpu" }): bound fake serial console to TCP port addr = [::1]:0 slot = gimlet 1
272026-01-14T21:22:37.566ZINFOtest_vpc_firewall: setting up gateway server
282026-01-14T21:22:37.566ZDEBGtest_vpc_firewall: successfully registered DTrace USDT probes
292026-01-14T21:22:37.566ZINFOtest_vpc_firewall: Setting rack_id rack_id = c19a698f-c6f9-4a17-ae30-20d711b8f7dc
302026-01-14T21:22:37.566ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /ignition versions = all starting from 2.0.0
312026-01-14T21:22:37.566ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /ignition versions = from 1.0.0 to 2.0.0
322026-01-14T21:22:37.566ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /ignition/{type}/{slot} versions = all starting from 2.0.0
332026-01-14T21:22:37.566ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /ignition/{type}/{slot} versions = from 1.0.0 to 2.0.0
342026-01-14T21:22:37.566ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /ignition/{type}/{slot}/{command} versions = all
352026-01-14T21:22:37.566ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /local/all-sp-ids versions = all
362026-01-14T21:22:37.566ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /local/switch-id versions = all
372026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /recovery/host-phase2 versions = all
382026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot} versions = all
392026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component versions = all
402026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component} versions = all
412026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component}/active-slot versions = all
422026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/component/{component}/active-slot versions = all
432026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component}/caboose versions = all
442026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component}/cfpa versions = all
452026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/component/{component}/clear-status versions = all
462026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component}/cmpa versions = all
472026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component}/hash/{firmware_slot} versions = all
482026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/component/{component}/hash/{firmware_slot} versions = all
492026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/component/{component}/reset versions = all
502026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component}/rot-boot-info versions = all
512026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component}/serial-console/attach versions = all
522026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/component/{component}/serial-console/detach versions = all
532026-01-14T21:22:37.567ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/component/{component}/update versions = all
542026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/component/{component}/update-abort versions = all
552026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/component/{component}/update-status versions = all
562026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/ereports versions = all
572026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = DELETE path = /sp/{type}/{slot}/host-phase2-progress versions = all
582026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/host-phase2-progress versions = all
592026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = DELETE path = /sp/{type}/{slot}/ipcc/installinator-image-id versions = all
602026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = PUT path = /sp/{type}/{slot}/ipcc/installinator-image-id versions = all
612026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/power-state versions = all
622026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/power-state versions = all
632026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/sensor/{sensor_id}/value versions = all
642026-01-14T21:22:37.568ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/startup-options versions = all
652026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = POST path = /sp/{type}/{slot}/startup-options versions = all
662026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/task-dump versions = all
672026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:59250 method = GET path = /sp/{type}/{slot}/task-dump/{task_dump_index} versions = all
682026-01-14T21:22:37.569ZINFOtest_vpc_firewall (dropshot): listening local_addr = [::1]:59250
692026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:59250
702026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (ManagementSwitch): attempting initial SP discovery discovery_addr = [::1]:42263 interface = fake-switch0
712026-01-14T21:22:37.569ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 1 }, kind: MgsRequest(Discover) }
722026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (ManagementSwitch): attempting initial SP discovery discovery_addr = [::1]:32904 interface = fake-switch1
732026-01-14T21:22:37.569ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 1 }, kind: MgsRequest(Discover) }
742026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (ManagementSwitch): attempting initial SP discovery discovery_addr = [::1]:37600 interface = fake-sled0
752026-01-14T21:22:37.569ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 1 }, kind: MgsRequest(Discover) }
762026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (ManagementSwitch): attempting initial SP discovery discovery_addr = [::1]:54292 interface = fake-sled1
772026-01-14T21:22:37.569ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 1 }, kind: MgsRequest(Discover) }
782026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (sensor-poller): waiting for SP discovery to complete... elapsed = 76.029\u{b5}s error = discovery process not yet complete
792026-01-14T21:22:37.569ZWARNtest_vpc_firewall (producer-server): using development metrics configuration overrides! bind_loopback = true nexus_address = None
802026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (producer-server): rebinding producer server on new IP collection_interval = 10s current_ip = None new_ip = ::1 producer_id = 68c474de-b69c-4ed4-9617-6414d5323f17
812026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (producer-server): registered DTrace probes
822026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (dropshot): registered endpoint local_addr = [::1]:35398 method = GET path = /{producer_id} versions = all
832026-01-14T21:22:37.569ZINFOtest_vpc_firewall (dropshot): listening file = /home/build/.cargo/registry/src/index.crates.io-1949cf8c6b5b557f/dropshot-0.16.6/src/server.rs:328 local_addr = [::1]:35398
842026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (dropshot): successfully registered DTrace USDT probes local_addr = [::1]:35398
852026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (producer-server): Requested any available port, Dropshot server has been bound to [::1]:35398
862026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (producer-server): Nexus IP not provided, will use DNS to resolve it
872026-01-14T21:22:37.569ZINFOtest_vpc_firewall (internal-dns-resolver): new DNS resolver addresses = [[::1:0:0:0:1]:53, [::2:0:0:0:1]:53, [::3:0:0:0:1]:53] file = internal-dns/resolver/src/resolver.rs:144
882026-01-14T21:22:37.569ZDEBGtest_vpc_firewall (producer-server): starting producer registration task
892026-01-14T21:22:37.569ZINFOtest_vpc_firewall (producer-server): starting oximeter metric producer server address = [::1]:35398 file = oximeter/producer/src/lib.rs:279 interval = 10s producer_id = 68c474de-b69c-4ed4-9617-6414d5323f17
902026-01-14T21:22:37.569ZINFOtest_vpc_firewall (producer-server): bound metrics producer server address = [::1]:35398 collection_interval = 10s producer_id = 68c474de-b69c-4ed4-9617-6414d5323f17
912026-01-14T21:22:37.570ZDEBGtest_vpc_firewall (producer-registration-task): registering as oximeter producer with Nexus registration_count = 0
922026-01-14T21:22:37.570ZTRACtest_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
932026-01-14T21:22:37.570ZDEBGtest_vpc_firewall: received discover; sending response sender = Sender { addr: [::1]:51843, vid: One } slot = sidecar 0
942026-01-14T21:22:37.570ZDEBGtest_vpc_firewall: received discover; sending response sender = Sender { addr: [::1]:53557, vid: One } slot = sidecar 1
952026-01-14T21:22:37.570ZDEBGtest_vpc_firewall: received discover; sending response sender = Sender { addr: [::1]:34841, vid: One } slot = gimlet 0
962026-01-14T21:22:37.570ZDEBGtest_vpc_firewall: received discover; sending response sender = Sender { addr: [::1]:51238, vid: One } slot = gimlet 1
972026-01-14T21:22:37.592ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 1 } interface = fake-switch0 response = Discover(DiscoverResponse { sp_port: One })
982026-01-14T21:22:37.593ZINFOtest_vpc_firewall (ManagementSwitch): initial discovery complete addr = [::1]:42263 interface = fake-switch0
992026-01-14T21:22:37.593ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 1 } interface = fake-switch1 response = Discover(DiscoverResponse { sp_port: One })
1002026-01-14T21:22:37.593ZINFOtest_vpc_firewall (ManagementSwitch): initial discovery complete addr = [::1]:32904 interface = fake-switch1
1012026-01-14T21:22:37.593ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 1 } interface = fake-sled0 response = Discover(DiscoverResponse { sp_port: One })
1022026-01-14T21:22:37.593ZINFOtest_vpc_firewall (ManagementSwitch): initial discovery complete addr = [::1]:37600 interface = fake-sled0
1032026-01-14T21:22:37.593ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 1 } interface = fake-sled1 response = Discover(DiscoverResponse { sp_port: One })
1042026-01-14T21:22:37.593ZINFOtest_vpc_firewall (ManagementSwitch): initial discovery complete addr = [::1]:54292 interface = fake-sled1
1052026-01-14T21:22:37.593ZWARNtest_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry count = 0 delay = 27.985364ms error = "proto error: io error: No route to host (os error 148)" file = oximeter/producer/src/lib.rs:371
1062026-01-14T21:22:37.593ZINFOtest_vpc_firewall (ManagementSwitch): received discovery response (not used for location) interface = (direct socket handle) sp_port = One
1072026-01-14T21:22:37.593ZINFOtest_vpc_firewall (ManagementSwitch): received discovery response (not used for location) interface = (direct socket handle) sp_port = One
1082026-01-14T21:22:37.593ZINFOtest_vpc_firewall (ManagementSwitch): received discovery response (used for location) interface = (direct socket handle) pos = 0 sp_port = One
1092026-01-14T21:22:37.593ZINFOtest_vpc_firewall (ManagementSwitch): received discovery response (used for location) interface = (direct socket handle) pos = 0 sp_port = One
1102026-01-14T21:22:37.593ZDEBGtest_vpc_firewall (ManagementSwitch): received location determination response interface = (direct socket handle) refined_locations = {"switch0"}
1112026-01-14T21:22:37.593ZINFOtest_vpc_firewall (sensor-poller): starting to poll SP sensor data every 1s
1122026-01-14T21:22:37.593ZINFOtest_vpc_firewall (sensor-poller): found a new little friend! chassis_type = Switch sp_slot = 1
1132026-01-14T21:22:37.593ZINFOtest_vpc_firewall (sensor-poller): found a new little friend! chassis_type = Switch sp_slot = 0
1142026-01-14T21:22:37.593ZINFOtest_vpc_firewall (sensor-poller): found a new little friend! chassis_type = Sled sp_slot = 0
1152026-01-14T21:22:37.593ZINFOtest_vpc_firewall (sensor-poller): found a new little friend! chassis_type = Sled sp_slot = 1
1162026-01-14T21:22:37.614ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
1172026-01-14T21:22:37.614ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
1182026-01-14T21:22:37.614ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
1192026-01-14T21:22:37.614ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
1202026-01-14T21:22:37.614ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 2 }, kind: MgsRequest(SpState) }
1212026-01-14T21:22:37.614ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 2 }, kind: MgsRequest(SpState) }
1222026-01-14T21:22:37.614ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 2 }, kind: MgsRequest(SpState) }
1232026-01-14T21:22:37.614ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 2 }, kind: MgsRequest(SpState) }
1242026-01-14T21:22:37.652ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
1252026-01-14T21:22:37.652ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
1262026-01-14T21:22:37.652ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
1272026-01-14T21:22:37.653ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
1282026-01-14T21:22:38.081ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 2 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
1292026-01-14T21:22:38.082ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 2 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
1302026-01-14T21:22:38.082ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 2 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
1312026-01-14T21:22:38.082ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 2 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
1322026-01-14T21:22:38.083ZTRACtest_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
1332026-01-14T21:22:38.083ZDEBGtest_vpc_firewall (sensor-poller): our little friend seems to have changed in some kind of way chassis_type = Switch current_state = SpUnderstanding { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0 } known_state = None new_hubris_archive_id = 0000000000000000 new_model = FAKE_SIM_SIDECAR new_serial = SimSidecar0 sp_slot = 0
1342026-01-14T21:22:38.084ZDEBGtest_vpc_firewall (sensor-poller): our little friend seems to have changed in some kind of way chassis_type = Switch current_state = SpUnderstanding { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0 } known_state = None new_hubris_archive_id = 0000000000000000 new_model = FAKE_SIM_SIDECAR new_serial = SimSidecar1 sp_slot = 1
1352026-01-14T21:22:38.084ZDEBGtest_vpc_firewall (sensor-poller): our little friend seems to have changed in some kind of way chassis_type = Sled current_state = SpUnderstanding { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0 } known_state = None new_hubris_archive_id = 0000000000000000 new_model = i86pc new_serial = SimGimlet00 sp_slot = 0
1362026-01-14T21:22:38.084ZDEBGtest_vpc_firewall (sensor-poller): our little friend seems to have changed in some kind of way chassis_type = Sled current_state = SpUnderstanding { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0 } known_state = None new_hubris_archive_id = 0000000000000000 new_model = i86pc new_serial = SimGimlet01 sp_slot = 1
1372026-01-14T21:22:38.085ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 3 }, kind: MgsRequest(Inventory { device_index: 0 }) }
1382026-01-14T21:22:38.085ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 3 }, kind: MgsRequest(Inventory { device_index: 0 }) }
1392026-01-14T21:22:38.086ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 3 }, kind: MgsRequest(Inventory { device_index: 0 }) }
1402026-01-14T21:22:38.086ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 3 }, kind: MgsRequest(Inventory { device_index: 0 }) }
1412026-01-14T21:22:38.123ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 3 } interface = fake-switch0 response = Inventory(TlvPage { offset: 0, total: 2 })
1422026-01-14T21:22:38.124ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 3 } interface = fake-switch1 response = Inventory(TlvPage { offset: 0, total: 0 })
1432026-01-14T21:22:38.124ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 3 } interface = fake-sled0 response = Inventory(TlvPage { offset: 0, total: 10 })
1442026-01-14T21:22:38.124ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 3 } interface = fake-sled1 response = Inventory(TlvPage { offset: 0, total: 10 })
1452026-01-14T21:22:38.131ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Switch component_id = dev-0 component_kind = fake-tmp-sensor description = dev-0 sp_slot = 0
1462026-01-14T21:22:38.131ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Switch component_id = dev-1 component_kind = fake-tmp-sensor description = dev-1 sp_slot = 0
1472026-01-14T21:22:38.131ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-0 component_kind = fake-tmp-sensor description = dev-0 sp_slot = 0
1482026-01-14T21:22:38.131ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-1 component_kind = tmp117 description = dev-1 sp_slot = 0
1492026-01-14T21:22:38.131ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-2 component_kind = tmp117 description = dev-2 sp_slot = 0
1502026-01-14T21:22:38.132ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-7 component_kind = max5970 description = dev-7 sp_slot = 0
1512026-01-14T21:22:38.132ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-8 component_kind = nvme_bmc description = dev-8 sp_slot = 0
1522026-01-14T21:22:38.132ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-39 component_kind = tmp451 description = dev-39 sp_slot = 0
1532026-01-14T21:22:38.132ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-46 component_kind = sbtsi description = dev-46 sp_slot = 0
1542026-01-14T21:22:38.132ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-53 component_kind = max31790 description = dev-53 sp_slot = 0
1552026-01-14T21:22:38.132ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-0 component_kind = tmp117 description = dev-0 sp_slot = 1
1562026-01-14T21:22:38.132ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-1 component_kind = tmp117 description = dev-1 sp_slot = 1
1572026-01-14T21:22:38.133ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-2 component_kind = tmp117 description = dev-2 sp_slot = 1
1582026-01-14T21:22:38.133ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-7 component_kind = max5970 description = dev-7 sp_slot = 1
1592026-01-14T21:22:38.133ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-8 component_kind = nvme_bmc description = dev-8 sp_slot = 1
1602026-01-14T21:22:38.133ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-39 component_kind = tmp451 description = dev-39 sp_slot = 1
1612026-01-14T21:22:38.133ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-46 component_kind = sbtsi description = dev-46 sp_slot = 1
1622026-01-14T21:22:38.133ZDEBGtest_vpc_firewall (sensor-poller): discovered a new component! chassis_type = Sled component_id = dev-53 component_kind = max31790 description = dev-53 sp_slot = 1
1632026-01-14T21:22:38.134ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 4 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
1642026-01-14T21:22:38.134ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 4 }, kind: MgsRequest(SpState) }
1652026-01-14T21:22:38.135ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 4 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
1662026-01-14T21:22:38.135ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 4 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
1672026-01-14T21:22:38.136ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
1682026-01-14T21:22:38.137ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
1692026-01-14T21:22:38.137ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
1702026-01-14T21:22:38.137ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
1712026-01-14T21:22:38.138ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
1722026-01-14T21:22:38.138ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
1732026-01-14T21:22:38.138ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
1742026-01-14T21:22:38.145ZWARNtest_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry count = 1 delay = 582.115584ms error = "proto error: io error: No route to host (os error 148)" file = oximeter/producer/src/lib.rs:371
1752026-01-14T21:22:38.156ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 4 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
1762026-01-14T21:22:38.156ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 4 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
1772026-01-14T21:22:38.157ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 4 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
1782026-01-14T21:22:38.157ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 4 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
1792026-01-14T21:22:38.158ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
1802026-01-14T21:22:38.160ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 5 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
1812026-01-14T21:22:38.161ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 5 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
1822026-01-14T21:22:38.161ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 5 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
1832026-01-14T21:22:38.246ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
1842026-01-14T21:22:38.252ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
1852026-01-14T21:22:38.252ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
1862026-01-14T21:22:38.252ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
1872026-01-14T21:22:38.252ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
1882026-01-14T21:22:38.252ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
1892026-01-14T21:22:38.323ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 5 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
1902026-01-14T21:22:38.323ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 5 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
1912026-01-14T21:22:38.323ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 5 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
1922026-01-14T21:22:38.326ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 6 }, kind: MgsRequest(SpState) }
1932026-01-14T21:22:38.326ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 6 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
1942026-01-14T21:22:38.326ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 6 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
1952026-01-14T21:22:38.381ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
1962026-01-14T21:22:38.382ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
1972026-01-14T21:22:38.382ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
1982026-01-14T21:22:38.382ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
1992026-01-14T21:22:38.382ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
2002026-01-14T21:22:38.382ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
2012026-01-14T21:22:38.382ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
2022026-01-14T21:22:38.383ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
2032026-01-14T21:22:38.383ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
2042026-01-14T21:22:38.383ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
2052026-01-14T21:22:38.432ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 6 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
2062026-01-14T21:22:38.432ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 6 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2072026-01-14T21:22:38.432ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 6 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
2082026-01-14T21:22:38.434ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
2092026-01-14T21:22:38.440ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 7 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
2102026-01-14T21:22:38.442ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 7 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
2112026-01-14T21:22:38.511ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
2122026-01-14T21:22:38.512ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
2132026-01-14T21:22:38.512ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
2142026-01-14T21:22:38.512ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
2152026-01-14T21:22:38.512ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
2162026-01-14T21:22:38.513ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
2172026-01-14T21:22:38.513ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
2182026-01-14T21:22:38.516ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 7 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
2192026-01-14T21:22:38.516ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 7 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2202026-01-14T21:22:38.521ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 8 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
2212026-01-14T21:22:38.521ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 8 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
2222026-01-14T21:22:38.521ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
2232026-01-14T21:22:38.521ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
2242026-01-14T21:22:38.521ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
2252026-01-14T21:22:38.522ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
2262026-01-14T21:22:38.522ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 8 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2272026-01-14T21:22:38.522ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 8 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2282026-01-14T21:22:38.526ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 9 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
2292026-01-14T21:22:38.526ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 9 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
2302026-01-14T21:22:38.526ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
2312026-01-14T21:22:38.526ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
2322026-01-14T21:22:38.526ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
2332026-01-14T21:22:38.526ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
2342026-01-14T21:22:38.527ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 9 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2352026-01-14T21:22:38.527ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 9 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2362026-01-14T21:22:38.528ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 10 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
2372026-01-14T21:22:38.528ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 10 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
2382026-01-14T21:22:38.528ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
2392026-01-14T21:22:38.528ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
2402026-01-14T21:22:38.528ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
2412026-01-14T21:22:38.528ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
2422026-01-14T21:22:38.528ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
2432026-01-14T21:22:38.528ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
2442026-01-14T21:22:38.529ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
2452026-01-14T21:22:38.529ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 10 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2462026-01-14T21:22:38.529ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 10 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
2472026-01-14T21:22:38.533ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 11 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
2482026-01-14T21:22:38.533ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 11 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
2492026-01-14T21:22:38.533ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
2502026-01-14T21:22:38.533ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
2512026-01-14T21:22:38.533ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
2522026-01-14T21:22:38.533ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
2532026-01-14T21:22:38.533ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
2542026-01-14T21:22:38.533ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
2552026-01-14T21:22:38.533ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
2562026-01-14T21:22:38.533ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
2572026-01-14T21:22:38.534ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
2582026-01-14T21:22:38.534ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 11 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
2592026-01-14T21:22:38.534ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 11 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2602026-01-14T21:22:38.542ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 12 }, kind: MgsRequest(SpState) }
2612026-01-14T21:22:38.543ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 12 }, kind: MgsRequest(SpState) }
2622026-01-14T21:22:38.662ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
2632026-01-14T21:22:38.662ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
2642026-01-14T21:22:38.683ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 12 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
2652026-01-14T21:22:38.683ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 12 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
2662026-01-14T21:22:38.683ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
2672026-01-14T21:22:38.684ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
2682026-01-14T21:22:38.684ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
2692026-01-14T21:22:38.684ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
2702026-01-14T21:22:38.684ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
2712026-01-14T21:22:38.684ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
2722026-01-14T21:22:38.684ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 5 }, kind: MgsRequest(SpState) }
2732026-01-14T21:22:38.684ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 7 }, kind: MgsRequest(SpState) }
2742026-01-14T21:22:38.684ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 13 }, kind: MgsRequest(SpState) }
2752026-01-14T21:22:38.684ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 13 }, kind: MgsRequest(SpState) }
2762026-01-14T21:22:38.684ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
2772026-01-14T21:22:38.684ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
2782026-01-14T21:22:38.684ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
2792026-01-14T21:22:38.684ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
2802026-01-14T21:22:38.684ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 7 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
2812026-01-14T21:22:38.685ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 5 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
2822026-01-14T21:22:38.685ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 13 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
2832026-01-14T21:22:38.685ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 13 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
2842026-01-14T21:22:38.685ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 8 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
2852026-01-14T21:22:38.685ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 6 }, kind: MgsRequest(SpState) }
2862026-01-14T21:22:38.685ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 14 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
2872026-01-14T21:22:38.685ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 14 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
2882026-01-14T21:22:38.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
2892026-01-14T21:22:38.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
2902026-01-14T21:22:38.687ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
2912026-01-14T21:22:38.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
2922026-01-14T21:22:38.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
2932026-01-14T21:22:38.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
2942026-01-14T21:22:38.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
2952026-01-14T21:22:38.832ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 8 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2962026-01-14T21:22:38.832ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 6 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
2972026-01-14T21:22:38.832ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 14 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2982026-01-14T21:22:38.832ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 14 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
2992026-01-14T21:22:38.841ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
3002026-01-14T21:22:38.844ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 9 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
3012026-01-14T21:22:38.844ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 15 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
3022026-01-14T21:22:38.844ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 15 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
3032026-01-14T21:22:38.860ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
3042026-01-14T21:22:38.860ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
3052026-01-14T21:22:38.860ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
3062026-01-14T21:22:38.860ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
3072026-01-14T21:22:38.860ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
3082026-01-14T21:22:38.860ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
3092026-01-14T21:22:38.861ZTRACtest_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
3102026-01-14T21:22:38.862ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 9 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3112026-01-14T21:22:38.862ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 15 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3122026-01-14T21:22:38.862ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 15 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3132026-01-14T21:22:38.906ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 10 }, kind: MgsRequest(SpState) }
3142026-01-14T21:22:38.906ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 16 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
3152026-01-14T21:22:38.906ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 16 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
3162026-01-14T21:22:38.929ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
3172026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
3182026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
3192026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
3202026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
3212026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
3222026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
3232026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
3242026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
3252026-01-14T21:22:38.929ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
3262026-01-14T21:22:38.929ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:59250 remote_addr = [::1]:35615
3272026-01-14T21:22:38.943ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 10 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
3282026-01-14T21:22:38.943ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 16 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3292026-01-14T21:22:38.943ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 16 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
3302026-01-14T21:22:38.943ZWARNtest_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry count = 2 delay = 1.380211619s error = "proto error: io error: No route to host (os error 148)" file = oximeter/producer/src/lib.rs:371
3312026-01-14T21:22:38.944ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:35615 req_id = 2ff12e1e-3e9d-4b27-85ee-ee02cae18342 uri = /local/switch-id
3322026-01-14T21:22:38.944ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:35615 req_id = 2ff12e1e-3e9d-4b27-85ee-ee02cae18342 uri = /local/switch-id version = 3.0.0
3332026-01-14T21:22:38.948ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
3342026-01-14T21:22:38.966ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 17 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
3352026-01-14T21:22:38.966ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 17 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
3362026-01-14T21:22:38.966ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 22105 local_addr = [::1]:59250 method = GET remote_addr = [::1]:35615 req_id = 2ff12e1e-3e9d-4b27-85ee-ee02cae18342 response_code = 200 uri = /local/switch-id
3372026-01-14T21:22:38.983ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
3382026-01-14T21:22:38.983ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
3392026-01-14T21:22:38.983ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
3402026-01-14T21:22:38.984ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
3412026-01-14T21:22:38.984ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
3422026-01-14T21:22:38.984ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
3432026-01-14T21:22:38.984ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
3442026-01-14T21:22:38.984ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:35615 req_id = ef3186d3-0cd0-46ea-9a05-43ea40ba6e9e uri = /sp/switch/0
3452026-01-14T21:22:38.984ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:35615 req_id = ef3186d3-0cd0-46ea-9a05-43ea40ba6e9e uri = /sp/switch/0 version = 3.0.0
3462026-01-14T21:22:38.984ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 11 }, kind: MgsRequest(SpState) }
3472026-01-14T21:22:38.985ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
3482026-01-14T21:22:38.985ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 17 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
3492026-01-14T21:22:38.985ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 17 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3502026-01-14T21:22:39.022ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 18 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
3512026-01-14T21:22:39.022ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 18 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
3522026-01-14T21:22:39.040ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
3532026-01-14T21:22:39.041ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
3542026-01-14T21:22:39.041ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
3552026-01-14T21:22:39.042ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
3562026-01-14T21:22:39.042ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 11 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
3572026-01-14T21:22:39.043ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 12 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
3582026-01-14T21:22:39.076ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 18 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3592026-01-14T21:22:39.076ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 18 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3602026-01-14T21:22:39.080ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 19 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
3612026-01-14T21:22:39.080ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 19 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
3622026-01-14T21:22:39.080ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
3632026-01-14T21:22:39.080ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
3642026-01-14T21:22:39.080ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
3652026-01-14T21:22:39.080ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
3662026-01-14T21:22:39.080ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 12 } interface = fake-switch0 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
3672026-01-14T21:22:39.081ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 97398 local_addr = [::1]:59250 method = GET remote_addr = [::1]:35615 req_id = ef3186d3-0cd0-46ea-9a05-43ea40ba6e9e response_code = 200 uri = /sp/switch/0
3682026-01-14T21:22:39.082ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 19 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3692026-01-14T21:22:39.082ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 19 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3702026-01-14T21:22:39.086ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 20 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
3712026-01-14T21:22:39.086ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 20 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
3722026-01-14T21:22:39.086ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
3732026-01-14T21:22:39.086ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
3742026-01-14T21:22:39.086ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
3752026-01-14T21:22:39.086ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
3762026-01-14T21:22:39.086ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
3772026-01-14T21:22:39.086ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
3782026-01-14T21:22:39.086ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
3792026-01-14T21:22:39.087ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 20 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3802026-01-14T21:22:39.087ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 20 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
3812026-01-14T21:22:39.095ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 21 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
3822026-01-14T21:22:39.095ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 21 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
3832026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
3842026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
3852026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
3862026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
3872026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
3882026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
3892026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
3902026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
3912026-01-14T21:22:39.097ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
3922026-01-14T21:22:39.100ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 21 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
3932026-01-14T21:22:39.100ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 21 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
3942026-01-14T21:22:39.146ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 22 }, kind: MgsRequest(SpState) }
3952026-01-14T21:22:39.146ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 22 }, kind: MgsRequest(SpState) }
3962026-01-14T21:22:39.147ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
3972026-01-14T21:22:39.147ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
3982026-01-14T21:22:39.148ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 22 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
3992026-01-14T21:22:39.148ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 22 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
4002026-01-14T21:22:39.148ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
4012026-01-14T21:22:39.148ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
4022026-01-14T21:22:39.609ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
4032026-01-14T21:22:39.609ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
4042026-01-14T21:22:39.609ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
4052026-01-14T21:22:39.609ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
4062026-01-14T21:22:39.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 7 }, kind: MgsRequest(SpState) }
4072026-01-14T21:22:39.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 13 }, kind: MgsRequest(SpState) }
4082026-01-14T21:22:39.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 23 }, kind: MgsRequest(SpState) }
4092026-01-14T21:22:39.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 23 }, kind: MgsRequest(SpState) }
4102026-01-14T21:22:39.629ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
4112026-01-14T21:22:39.629ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
4122026-01-14T21:22:39.629ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
4132026-01-14T21:22:39.629ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
4142026-01-14T21:22:39.629ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 13 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
4152026-01-14T21:22:39.629ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 7 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
4162026-01-14T21:22:39.629ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 23 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
4172026-01-14T21:22:39.629ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 23 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
4182026-01-14T21:22:39.629ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 14 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
4192026-01-14T21:22:39.629ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 8 }, kind: MgsRequest(SpState) }
4202026-01-14T21:22:39.629ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 24 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
4212026-01-14T21:22:39.629ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 24 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
4222026-01-14T21:22:39.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
4232026-01-14T21:22:39.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
4242026-01-14T21:22:39.630ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
4252026-01-14T21:22:39.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
4262026-01-14T21:22:39.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
4272026-01-14T21:22:39.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
4282026-01-14T21:22:39.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
4292026-01-14T21:22:39.630ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 14 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4302026-01-14T21:22:39.630ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 8 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
4312026-01-14T21:22:39.630ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 24 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4322026-01-14T21:22:39.630ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 24 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4332026-01-14T21:22:39.632ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
4342026-01-14T21:22:39.634ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 15 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
4352026-01-14T21:22:39.634ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 25 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
4362026-01-14T21:22:39.634ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 25 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
4372026-01-14T21:22:39.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
4382026-01-14T21:22:39.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
4392026-01-14T21:22:39.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
4402026-01-14T21:22:39.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
4412026-01-14T21:22:39.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
4422026-01-14T21:22:39.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
4432026-01-14T21:22:39.634ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 15 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4442026-01-14T21:22:39.634ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 25 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4452026-01-14T21:22:39.634ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 25 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4462026-01-14T21:22:39.637ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 16 }, kind: MgsRequest(SpState) }
4472026-01-14T21:22:39.637ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 26 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
4482026-01-14T21:22:39.637ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 26 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
4492026-01-14T21:22:39.637ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
4502026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
4512026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
4522026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
4532026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
4542026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
4552026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
4562026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
4572026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
4582026-01-14T21:22:39.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
4592026-01-14T21:22:39.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 16 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
4602026-01-14T21:22:39.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 26 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4612026-01-14T21:22:39.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 26 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
4622026-01-14T21:22:39.637ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
4632026-01-14T21:22:39.643ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 27 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
4642026-01-14T21:22:39.643ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 27 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
4652026-01-14T21:22:39.643ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
4662026-01-14T21:22:39.643ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
4672026-01-14T21:22:39.643ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
4682026-01-14T21:22:39.643ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
4692026-01-14T21:22:39.643ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
4702026-01-14T21:22:39.643ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
4712026-01-14T21:22:39.643ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
4722026-01-14T21:22:39.643ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 27 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
4732026-01-14T21:22:39.643ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 27 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4742026-01-14T21:22:39.646ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 28 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
4752026-01-14T21:22:39.646ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 28 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
4762026-01-14T21:22:39.646ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
4772026-01-14T21:22:39.646ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
4782026-01-14T21:22:39.647ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
4792026-01-14T21:22:39.647ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
4802026-01-14T21:22:39.647ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 28 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4812026-01-14T21:22:39.647ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 28 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4822026-01-14T21:22:39.648ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 29 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
4832026-01-14T21:22:39.648ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 29 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
4842026-01-14T21:22:39.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
4852026-01-14T21:22:39.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
4862026-01-14T21:22:39.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
4872026-01-14T21:22:39.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
4882026-01-14T21:22:39.650ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 29 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4892026-01-14T21:22:39.650ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 29 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
4902026-01-14T21:22:39.652ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 30 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
4912026-01-14T21:22:39.652ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 30 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
4922026-01-14T21:22:39.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
4932026-01-14T21:22:39.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
4942026-01-14T21:22:39.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
4952026-01-14T21:22:39.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
4962026-01-14T21:22:39.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
4972026-01-14T21:22:39.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
4982026-01-14T21:22:39.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
4992026-01-14T21:22:39.652ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 30 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5002026-01-14T21:22:39.652ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 30 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
5012026-01-14T21:22:39.656ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 31 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
5022026-01-14T21:22:39.656ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 31 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
5032026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
5042026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
5052026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
5062026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
5072026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
5082026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
5092026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
5102026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
5112026-01-14T21:22:39.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
5122026-01-14T21:22:39.656ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 31 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
5132026-01-14T21:22:39.656ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 31 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5142026-01-14T21:22:39.661ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 32 }, kind: MgsRequest(SpState) }
5152026-01-14T21:22:39.661ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 32 }, kind: MgsRequest(SpState) }
5162026-01-14T21:22:39.661ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
5172026-01-14T21:22:39.661ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
5182026-01-14T21:22:39.662ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 32 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
5192026-01-14T21:22:39.662ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 32 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
5202026-01-14T21:22:39.663ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
5212026-01-14T21:22:39.663ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
5222026-01-14T21:22:39.822ZTRACtest_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
5232026-01-14T21:22:39.824ZWARNtest_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry count = 3 delay = 2.260965811s error = "proto error: io error: No route to host (os error 148)" file = oximeter/producer/src/lib.rs:371
5242026-01-14T21:22:40.678ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
5252026-01-14T21:22:40.678ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
5262026-01-14T21:22:40.678ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
5272026-01-14T21:22:40.678ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
5282026-01-14T21:22:40.679ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 9 }, kind: MgsRequest(SpState) }
5292026-01-14T21:22:40.679ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 17 }, kind: MgsRequest(SpState) }
5302026-01-14T21:22:40.679ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 33 }, kind: MgsRequest(SpState) }
5312026-01-14T21:22:40.679ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 33 }, kind: MgsRequest(SpState) }
5322026-01-14T21:22:40.785ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
5332026-01-14T21:22:40.786ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
5342026-01-14T21:22:40.786ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
5352026-01-14T21:22:40.786ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
5362026-01-14T21:22:40.791ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 17 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
5372026-01-14T21:22:40.792ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 9 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
5382026-01-14T21:22:40.792ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 33 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
5392026-01-14T21:22:40.792ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 33 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
5402026-01-14T21:22:40.798ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 18 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
5412026-01-14T21:22:40.798ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 10 }, kind: MgsRequest(SpState) }
5422026-01-14T21:22:40.798ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 34 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
5432026-01-14T21:22:40.798ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 34 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
5442026-01-14T21:22:40.799ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
5452026-01-14T21:22:40.799ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
5462026-01-14T21:22:40.799ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
5472026-01-14T21:22:40.799ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
5482026-01-14T21:22:40.799ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
5492026-01-14T21:22:40.799ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
5502026-01-14T21:22:40.799ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
5512026-01-14T21:22:40.874ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 18 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5522026-01-14T21:22:40.874ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 10 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
5532026-01-14T21:22:40.874ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 34 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5542026-01-14T21:22:40.874ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 34 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5552026-01-14T21:22:40.877ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
5562026-01-14T21:22:40.886ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 19 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
5572026-01-14T21:22:40.886ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 35 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
5582026-01-14T21:22:40.887ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 35 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
5592026-01-14T21:22:40.987ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
5602026-01-14T21:22:40.987ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
5612026-01-14T21:22:40.987ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
5622026-01-14T21:22:40.987ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
5632026-01-14T21:22:40.988ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
5642026-01-14T21:22:40.988ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
5652026-01-14T21:22:41.004ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 19 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5662026-01-14T21:22:41.004ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 35 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5672026-01-14T21:22:41.004ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 35 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5682026-01-14T21:22:41.012ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 20 }, kind: MgsRequest(SpState) }
5692026-01-14T21:22:41.012ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 36 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
5702026-01-14T21:22:41.012ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 36 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
5712026-01-14T21:22:41.017ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
5722026-01-14T21:22:41.017ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
5732026-01-14T21:22:41.017ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
5742026-01-14T21:22:41.018ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
5752026-01-14T21:22:41.018ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
5762026-01-14T21:22:41.018ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
5772026-01-14T21:22:41.018ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
5782026-01-14T21:22:41.018ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
5792026-01-14T21:22:41.018ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
5802026-01-14T21:22:41.018ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
5812026-01-14T21:22:41.035ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 20 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
5822026-01-14T21:22:41.035ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 36 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5832026-01-14T21:22:41.035ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 36 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
5842026-01-14T21:22:41.036ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
5852026-01-14T21:22:41.047ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
5862026-01-14T21:22:41.047ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
5872026-01-14T21:22:43.886ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
5882026-01-14T21:22:43.886ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
5892026-01-14T21:22:43.886ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
5902026-01-14T21:22:43.886ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
5912026-01-14T21:22:43.886ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
5922026-01-14T21:22:43.887ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
5932026-01-14T21:22:43.887ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
5942026-01-14T21:22:43.916ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
5952026-01-14T21:22:43.916ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 37 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
5962026-01-14T21:22:43.916ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
5972026-01-14T21:22:43.916ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 37 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
5982026-01-14T21:22:43.918ZTRACtest_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
5992026-01-14T21:22:43.919ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
6002026-01-14T21:22:43.919ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
6012026-01-14T21:22:43.929ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 11 }, kind: MgsRequest(SpState) }
6022026-01-14T21:22:43.929ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 21 }, kind: MgsRequest(SpState) }
6032026-01-14T21:22:43.931ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
6042026-01-14T21:22:43.931ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
6052026-01-14T21:22:43.966ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
6062026-01-14T21:22:43.966ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
6072026-01-14T21:22:43.966ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
6082026-01-14T21:22:43.966ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
6092026-01-14T21:22:43.966ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
6102026-01-14T21:22:43.966ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
6112026-01-14T21:22:43.966ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
6122026-01-14T21:22:43.967ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
6132026-01-14T21:22:43.967ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
6142026-01-14T21:22:43.967ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
6152026-01-14T21:22:43.967ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
6162026-01-14T21:22:43.967ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
6172026-01-14T21:22:43.967ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
6182026-01-14T21:22:44.154ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 21 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
6192026-01-14T21:22:44.155ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 11 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
6202026-01-14T21:22:44.155ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 37 interface = fake-sled0 peer = [::1]:37600
6212026-01-14T21:22:44.155ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
6222026-01-14T21:22:44.155ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 38 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
6232026-01-14T21:22:44.156ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 37 interface = fake-sled1 peer = [::1]:54292
6242026-01-14T21:22:44.156ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
6252026-01-14T21:22:44.156ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 38 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
6262026-01-14T21:22:44.207ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 22 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
6272026-01-14T21:22:44.208ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 12 }, kind: MgsRequest(SpState) }
6282026-01-14T21:22:44.210ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
6292026-01-14T21:22:44.210ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
6302026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
6312026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
6322026-01-14T21:22:44.404ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
6332026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
6342026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
6352026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
6362026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
6372026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
6382026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
6392026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
6402026-01-14T21:22:44.404ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
6412026-01-14T21:22:44.405ZWARNtest_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry count = 4 delay = 6.841685144s error = "proto error: io error: No route to host (os error 148)" file = oximeter/producer/src/lib.rs:371
6422026-01-14T21:22:44.413ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 22 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
6432026-01-14T21:22:44.413ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 12 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
6442026-01-14T21:22:44.413ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 38 interface = fake-sled0 peer = [::1]:37600
6452026-01-14T21:22:44.413ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
6462026-01-14T21:22:44.413ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 39 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
6472026-01-14T21:22:44.413ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 38 interface = fake-sled1 peer = [::1]:54292
6482026-01-14T21:22:44.413ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
6492026-01-14T21:22:44.413ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 39 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
6502026-01-14T21:22:44.413ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:59250 remote_addr = [::1]:62232
6512026-01-14T21:22:44.416ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
6522026-01-14T21:22:44.425ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 23 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
6532026-01-14T21:22:44.426ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
6542026-01-14T21:22:44.426ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
6552026-01-14T21:22:44.431ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1cfdb4b1-2f19-4c65-bed5-a5066cfa2193 uri = /ignition
6562026-01-14T21:22:44.431ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1cfdb4b1-2f19-4c65-bed5-a5066cfa2193 uri = /ignition version = 3.0.0
6572026-01-14T21:22:44.431ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
6582026-01-14T21:22:44.431ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
6592026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
6602026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
6612026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
6622026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
6632026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
6642026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
6652026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
6662026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
6672026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
6682026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
6692026-01-14T21:22:44.432ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
6702026-01-14T21:22:44.435ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 23 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
6712026-01-14T21:22:44.435ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 24 }, kind: MgsRequest(BulkIgnitionState { offset: 0 }) }
6722026-01-14T21:22:44.436ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 39 interface = fake-sled0 peer = [::1]:37600
6732026-01-14T21:22:44.436ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
6742026-01-14T21:22:44.436ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 40 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
6752026-01-14T21:22:44.436ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 39 interface = fake-sled1 peer = [::1]:54292
6762026-01-14T21:22:44.436ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
6772026-01-14T21:22:44.436ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 40 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
6782026-01-14T21:22:44.447ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
6792026-01-14T21:22:44.447ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
6802026-01-14T21:22:44.452ZDEBGtest_vpc_firewall: received bulk ignition state request offset = 0 slot = sidecar 0 state = [IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Sidecar, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Sidecar, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Gimlet, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Gimlet, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }]
6812026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
6822026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
6832026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
6842026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
6852026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
6862026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
6872026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
6882026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
6892026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
6902026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
6912026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
6922026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
6932026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
6942026-01-14T21:22:44.453ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
6952026-01-14T21:22:44.454ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
6962026-01-14T21:22:44.454ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
6972026-01-14T21:22:44.555ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 24 } interface = fake-switch0 response = BulkIgnitionState(TlvPage { offset: 0, total: 35 })
6982026-01-14T21:22:44.555ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 25 }, kind: MgsRequest(SpState) }
6992026-01-14T21:22:44.555ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 40 interface = fake-sled0 peer = [::1]:37600
7002026-01-14T21:22:44.555ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
7012026-01-14T21:22:44.555ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 41 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
7022026-01-14T21:22:44.555ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 40 interface = fake-sled1 peer = [::1]:54292
7032026-01-14T21:22:44.555ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
7042026-01-14T21:22:44.555ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 41 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
7052026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 4 returned by ignition controller SP
7062026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 5 returned by ignition controller SP
7072026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 6 returned by ignition controller SP
7082026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 7 returned by ignition controller SP
7092026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 8 returned by ignition controller SP
7102026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 9 returned by ignition controller SP
7112026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 10 returned by ignition controller SP
7122026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 11 returned by ignition controller SP
7132026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 12 returned by ignition controller SP
7142026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 13 returned by ignition controller SP
7152026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 14 returned by ignition controller SP
7162026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 15 returned by ignition controller SP
7172026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 16 returned by ignition controller SP
7182026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 17 returned by ignition controller SP
7192026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 18 returned by ignition controller SP
7202026-01-14T21:22:44.556ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 19 returned by ignition controller SP
7212026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 20 returned by ignition controller SP
7222026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 21 returned by ignition controller SP
7232026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 22 returned by ignition controller SP
7242026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 23 returned by ignition controller SP
7252026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 24 returned by ignition controller SP
7262026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 25 returned by ignition controller SP
7272026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 26 returned by ignition controller SP
7282026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 27 returned by ignition controller SP
7292026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 28 returned by ignition controller SP
7302026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 29 returned by ignition controller SP
7312026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 30 returned by ignition controller SP
7322026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 31 returned by ignition controller SP
7332026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 32 returned by ignition controller SP
7342026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 33 returned by ignition controller SP
7352026-01-14T21:22:44.557ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 34 returned by ignition controller SP
7362026-01-14T21:22:44.562ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 130842 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1cfdb4b1-2f19-4c65-bed5-a5066cfa2193 response_code = 200 uri = /ignition
7372026-01-14T21:22:44.562ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(SpState) }
7382026-01-14T21:22:44.562ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(SpState) }
7392026-01-14T21:22:44.568ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
7402026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
7412026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
7422026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
7432026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
7442026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
7452026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
7462026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
7472026-01-14T21:22:44.569ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
7482026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
7492026-01-14T21:22:44.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
7502026-01-14T21:22:44.569ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
7512026-01-14T21:22:44.587ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = ce846b15-de3e-483e-8675-13318dfc0db7 uri = /sp/switch/0
7522026-01-14T21:22:44.587ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = ce846b15-de3e-483e-8675-13318dfc0db7 uri = /sp/switch/0 version = 3.0.0
7532026-01-14T21:22:44.587ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 25 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
7542026-01-14T21:22:44.588ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 41 interface = fake-sled0 peer = [::1]:37600
7552026-01-14T21:22:44.588ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(SpState) }
7562026-01-14T21:22:44.588ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 42 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
7572026-01-14T21:22:44.588ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 41 interface = fake-sled1 peer = [::1]:54292
7582026-01-14T21:22:44.588ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(SpState) }
7592026-01-14T21:22:44.588ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 42 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
7602026-01-14T21:22:44.589ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
7612026-01-14T21:22:44.589ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
7622026-01-14T21:22:44.589ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
7632026-01-14T21:22:44.589ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
7642026-01-14T21:22:44.589ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
7652026-01-14T21:22:44.589ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 26 }, kind: MgsRequest(SpState) }
7662026-01-14T21:22:44.589ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(SpState) }
7672026-01-14T21:22:44.589ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(SpState) }
7682026-01-14T21:22:45.486ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
7692026-01-14T21:22:45.486ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
7702026-01-14T21:22:45.486ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
7712026-01-14T21:22:45.486ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
7722026-01-14T21:22:45.487ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
7732026-01-14T21:22:45.488ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
7742026-01-14T21:22:45.488ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
7752026-01-14T21:22:45.491ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 13 }, kind: MgsRequest(SpState) }
7762026-01-14T21:22:45.497ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
7772026-01-14T21:22:45.498ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 26 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
7782026-01-14T21:22:45.498ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 27 }, kind: MgsRequest(SpState) }
7792026-01-14T21:22:45.498ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 42 interface = fake-sled0 peer = [::1]:37600
7802026-01-14T21:22:45.498ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(SpState) }
7812026-01-14T21:22:45.498ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 43 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
7822026-01-14T21:22:45.498ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 42 interface = fake-sled1 peer = [::1]:54292
7832026-01-14T21:22:45.498ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(SpState) }
7842026-01-14T21:22:45.498ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 43 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
7852026-01-14T21:22:45.500ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
7862026-01-14T21:22:45.500ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
7872026-01-14T21:22:45.537ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
7882026-01-14T21:22:45.537ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
7892026-01-14T21:22:45.537ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
7902026-01-14T21:22:45.537ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
7912026-01-14T21:22:45.537ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
7922026-01-14T21:22:45.537ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
7932026-01-14T21:22:45.537ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
7942026-01-14T21:22:45.537ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 13 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
7952026-01-14T21:22:45.540ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 14 }, kind: MgsRequest(SpState) }
7962026-01-14T21:22:45.568ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
7972026-01-14T21:22:45.569ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 27 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
7982026-01-14T21:22:45.569ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 28 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
7992026-01-14T21:22:45.569ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 43 interface = fake-sled0 peer = [::1]:37600
8002026-01-14T21:22:45.569ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
8012026-01-14T21:22:45.569ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 44 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
8022026-01-14T21:22:45.569ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 43 interface = fake-sled1 peer = [::1]:54292
8032026-01-14T21:22:45.569ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
8042026-01-14T21:22:45.569ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 44 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
8052026-01-14T21:22:45.571ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
8062026-01-14T21:22:45.571ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
8072026-01-14T21:22:45.572ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
8082026-01-14T21:22:45.572ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
8092026-01-14T21:22:45.572ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
8102026-01-14T21:22:45.572ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
8112026-01-14T21:22:45.572ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
8122026-01-14T21:22:45.572ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
8132026-01-14T21:22:45.572ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
8142026-01-14T21:22:45.572ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
8152026-01-14T21:22:45.572ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 14 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
8162026-01-14T21:22:45.572ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
8172026-01-14T21:22:45.572ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 28 } interface = fake-switch0 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
8182026-01-14T21:22:45.573ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 29 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
8192026-01-14T21:22:45.573ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 44 interface = fake-sled0 peer = [::1]:37600
8202026-01-14T21:22:45.573ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
8212026-01-14T21:22:45.573ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 45 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
8222026-01-14T21:22:45.573ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 44 interface = fake-sled1 peer = [::1]:54292
8232026-01-14T21:22:45.573ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
8242026-01-14T21:22:45.573ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 45 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
8252026-01-14T21:22:45.577ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 990051 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = ce846b15-de3e-483e-8675-13318dfc0db7 response_code = 200 uri = /sp/switch/0
8262026-01-14T21:22:45.577ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
8272026-01-14T21:22:45.577ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
8282026-01-14T21:22:45.589ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
8292026-01-14T21:22:45.589ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
8302026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
8312026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
8322026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
8332026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
8342026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
8352026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
8362026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
8372026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
8382026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
8392026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
8402026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
8412026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
8422026-01-14T21:22:45.590ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
8432026-01-14T21:22:45.596ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 18750ca9-410d-487e-9745-96614b124d77 uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
8442026-01-14T21:22:45.596ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 18750ca9-410d-487e-9745-96614b124d77 uri = /sp/switch/0/component/sp/caboose?firmware_slot=0 version = 3.0.0
8452026-01-14T21:22:45.596ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 29 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
8462026-01-14T21:22:45.596ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 45 interface = fake-sled0 peer = [::1]:37600
8472026-01-14T21:22:45.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
8482026-01-14T21:22:45.596ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 46 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
8492026-01-14T21:22:45.596ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 45 interface = fake-sled1 peer = [::1]:54292
8502026-01-14T21:22:45.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
8512026-01-14T21:22:45.596ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 46 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
8522026-01-14T21:22:45.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
8532026-01-14T21:22:45.604ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 15 }, kind: MgsRequest(SpState) }
8542026-01-14T21:22:45.604ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 30 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
8552026-01-14T21:22:45.604ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
8562026-01-14T21:22:45.604ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
8572026-01-14T21:22:45.608ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
8582026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
8592026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
8602026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
8612026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
8622026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
8632026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
8642026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
8652026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
8662026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
8672026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
8682026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
8692026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
8702026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
8712026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
8722026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
8732026-01-14T21:22:45.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
8742026-01-14T21:22:45.609ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 30 } interface = fake-switch0 response = CabooseValue
8752026-01-14T21:22:45.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 31 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
8762026-01-14T21:22:45.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 15 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
8772026-01-14T21:22:45.611ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 46 interface = fake-sled0 peer = [::1]:37600
8782026-01-14T21:22:45.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
8792026-01-14T21:22:45.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 47 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
8802026-01-14T21:22:45.611ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 46 interface = fake-sled1 peer = [::1]:54292
8812026-01-14T21:22:45.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
8822026-01-14T21:22:45.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 47 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
8832026-01-14T21:22:45.615ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 16 }, kind: MgsRequest(SpState) }
8842026-01-14T21:22:45.615ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
8852026-01-14T21:22:45.615ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
8862026-01-14T21:22:45.641ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
8872026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
8882026-01-14T21:22:45.642ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
8892026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
8902026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
8912026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
8922026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
8932026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
8942026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
8952026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
8962026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
8972026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
8982026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
8992026-01-14T21:22:45.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
9002026-01-14T21:22:45.642ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 31 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
9012026-01-14T21:22:45.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 32 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
9022026-01-14T21:22:45.643ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 16 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
9032026-01-14T21:22:45.644ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 47 interface = fake-sled0 peer = [::1]:37600
9042026-01-14T21:22:45.644ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
9052026-01-14T21:22:45.644ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 48 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
9062026-01-14T21:22:45.644ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 47 interface = fake-sled1 peer = [::1]:54292
9072026-01-14T21:22:45.644ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
9082026-01-14T21:22:45.644ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 48 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
9092026-01-14T21:22:45.647ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
9102026-01-14T21:22:45.650ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
9112026-01-14T21:22:45.650ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
9122026-01-14T21:22:45.672ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
9132026-01-14T21:22:45.672ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
9142026-01-14T21:22:45.672ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
9152026-01-14T21:22:45.672ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
9162026-01-14T21:22:45.672ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
9172026-01-14T21:22:45.672ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
9182026-01-14T21:22:45.672ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
9192026-01-14T21:22:45.672ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
9202026-01-14T21:22:45.673ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 32 } interface = fake-switch0 response = CabooseValue
9212026-01-14T21:22:45.673ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 33 }, kind: MgsRequest(SpState) }
9222026-01-14T21:22:45.673ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 48 interface = fake-sled0 peer = [::1]:37600
9232026-01-14T21:22:45.673ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
9242026-01-14T21:22:45.675ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 49 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
9252026-01-14T21:22:45.677ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 48 interface = fake-sled1 peer = [::1]:54292
9262026-01-14T21:22:45.677ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
9272026-01-14T21:22:45.678ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 49 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
9282026-01-14T21:22:45.680ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
9292026-01-14T21:22:45.680ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
9302026-01-14T21:22:45.682ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
9312026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
9322026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
9332026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
9342026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
9352026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
9362026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
9372026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
9382026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
9392026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
9402026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
9412026-01-14T21:22:45.682ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
9422026-01-14T21:22:45.683ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 33 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
9432026-01-14T21:22:45.683ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 34 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
9442026-01-14T21:22:45.683ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 49 interface = fake-sled0 peer = [::1]:37600
9452026-01-14T21:22:45.683ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
9462026-01-14T21:22:45.683ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 50 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
9472026-01-14T21:22:45.683ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 49 interface = fake-sled1 peer = [::1]:54292
9482026-01-14T21:22:45.683ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
9492026-01-14T21:22:45.683ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 50 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
9502026-01-14T21:22:45.683ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
9512026-01-14T21:22:45.683ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
9522026-01-14T21:22:45.687ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
9532026-01-14T21:22:45.687ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
9542026-01-14T21:22:45.694ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
9552026-01-14T21:22:45.694ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
9562026-01-14T21:22:45.694ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
9572026-01-14T21:22:45.694ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
9582026-01-14T21:22:45.694ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
9592026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
9602026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
9612026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
9622026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
9632026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
9642026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
9652026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
9662026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
9672026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
9682026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
9692026-01-14T21:22:45.695ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
9702026-01-14T21:22:45.696ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 34 } interface = fake-switch0 response = CabooseValue
9712026-01-14T21:22:45.696ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 35 }, kind: MgsRequest(SpState) }
9722026-01-14T21:22:45.696ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 50 interface = fake-sled0 peer = [::1]:37600
9732026-01-14T21:22:45.696ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
9742026-01-14T21:22:45.696ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 51 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
9752026-01-14T21:22:45.696ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 50 interface = fake-sled1 peer = [::1]:54292
9762026-01-14T21:22:45.696ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
9772026-01-14T21:22:45.696ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 51 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
9782026-01-14T21:22:45.705ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(SpState) }
9792026-01-14T21:22:45.705ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(SpState) }
9802026-01-14T21:22:45.719ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
9812026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
9822026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
9832026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
9842026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
9852026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
9862026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
9872026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
9882026-01-14T21:22:45.719ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
9892026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
9902026-01-14T21:22:45.719ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
9912026-01-14T21:22:45.719ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
9922026-01-14T21:22:45.721ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 35 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
9932026-01-14T21:22:45.721ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 36 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
9942026-01-14T21:22:45.721ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 51 interface = fake-sled0 peer = [::1]:37600
9952026-01-14T21:22:45.721ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(SpState) }
9962026-01-14T21:22:45.721ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 52 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
9972026-01-14T21:22:45.722ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 51 interface = fake-sled1 peer = [::1]:54292
9982026-01-14T21:22:45.722ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(SpState) }
9992026-01-14T21:22:45.722ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 52 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
10002026-01-14T21:22:45.722ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
10012026-01-14T21:22:45.722ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
10022026-01-14T21:22:45.722ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
10032026-01-14T21:22:45.722ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
10042026-01-14T21:22:45.722ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(SpState) }
10052026-01-14T21:22:45.722ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(SpState) }
10062026-01-14T21:22:45.723ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
10072026-01-14T21:22:45.723ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
10082026-01-14T21:22:45.723ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
10092026-01-14T21:22:45.723ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
10102026-01-14T21:22:45.729ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 36 } interface = fake-switch0 response = CabooseValue
10112026-01-14T21:22:45.729ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
10122026-01-14T21:22:45.729ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 52 interface = fake-sled0 peer = [::1]:37600
10132026-01-14T21:22:45.730ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(SpState) }
10142026-01-14T21:22:45.730ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 53 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
10152026-01-14T21:22:45.730ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 52 interface = fake-sled1 peer = [::1]:54292
10162026-01-14T21:22:45.730ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(SpState) }
10172026-01-14T21:22:45.730ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 53 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
10182026-01-14T21:22:45.731ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
10192026-01-14T21:22:45.731ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
10202026-01-14T21:22:45.731ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
10212026-01-14T21:22:45.732ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
10222026-01-14T21:22:45.732ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
10232026-01-14T21:22:45.732ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
10242026-01-14T21:22:45.732ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
10252026-01-14T21:22:45.732ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
10262026-01-14T21:22:45.733ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
10272026-01-14T21:22:45.733ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
10282026-01-14T21:22:45.733ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 37 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
10292026-01-14T21:22:45.733ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
10302026-01-14T21:22:45.734ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 53 interface = fake-sled0 peer = [::1]:37600
10312026-01-14T21:22:45.734ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
10322026-01-14T21:22:45.734ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 54 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
10332026-01-14T21:22:45.734ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 53 interface = fake-sled1 peer = [::1]:54292
10342026-01-14T21:22:45.734ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
10352026-01-14T21:22:45.735ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 54 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
10362026-01-14T21:22:45.738ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
10372026-01-14T21:22:45.746ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
10382026-01-14T21:22:45.751ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
10392026-01-14T21:22:45.751ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
10402026-01-14T21:22:45.751ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
10412026-01-14T21:22:45.751ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
10422026-01-14T21:22:45.751ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
10432026-01-14T21:22:45.751ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
10442026-01-14T21:22:45.752ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
10452026-01-14T21:22:45.752ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
10462026-01-14T21:22:45.752ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 38 } interface = fake-switch0 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
10472026-01-14T21:22:45.752ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
10482026-01-14T21:22:45.754ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 54 interface = fake-sled0 peer = [::1]:37600
10492026-01-14T21:22:45.754ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
10502026-01-14T21:22:45.754ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 55 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
10512026-01-14T21:22:45.754ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 54 interface = fake-sled1 peer = [::1]:54292
10522026-01-14T21:22:45.754ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
10532026-01-14T21:22:45.754ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 55 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
10542026-01-14T21:22:45.756ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
10552026-01-14T21:22:45.756ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
10562026-01-14T21:22:45.761ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
10572026-01-14T21:22:45.761ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
10582026-01-14T21:22:45.761ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
10592026-01-14T21:22:45.761ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
10602026-01-14T21:22:45.761ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
10612026-01-14T21:22:45.761ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
10622026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
10632026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
10642026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
10652026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
10662026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
10672026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
10682026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
10692026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
10702026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
10712026-01-14T21:22:45.762ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 39 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
10722026-01-14T21:22:45.762ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
10732026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 55 interface = fake-sled0 peer = [::1]:37600
10742026-01-14T21:22:45.762ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
10752026-01-14T21:22:45.762ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 56 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
10762026-01-14T21:22:45.762ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 55 interface = fake-sled1 peer = [::1]:54292
10772026-01-14T21:22:45.762ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
10782026-01-14T21:22:45.762ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 56 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
10792026-01-14T21:22:45.777ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
10802026-01-14T21:22:45.777ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
10812026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
10822026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
10832026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
10842026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
10852026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
10862026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
10872026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
10882026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
10892026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
10902026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
10912026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
10922026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
10932026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
10942026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
10952026-01-14T21:22:45.779ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
10962026-01-14T21:22:45.780ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
10972026-01-14T21:22:45.796ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 40 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
10982026-01-14T21:22:45.803ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(SpState) }
10992026-01-14T21:22:45.803ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 56 interface = fake-sled0 peer = [::1]:37600
11002026-01-14T21:22:45.803ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
11012026-01-14T21:22:45.803ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 57 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
11022026-01-14T21:22:45.803ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 56 interface = fake-sled1 peer = [::1]:54292
11032026-01-14T21:22:45.803ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
11042026-01-14T21:22:45.803ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 57 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
11052026-01-14T21:22:45.808ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 212647 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 18750ca9-410d-487e-9745-96614b124d77 response_code = 200 uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
11062026-01-14T21:22:45.809ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
11072026-01-14T21:22:45.809ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
11082026-01-14T21:22:45.818ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
11092026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
11102026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
11112026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
11122026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
11132026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
11142026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
11152026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
11162026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
11172026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
11182026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
11192026-01-14T21:22:45.818ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
11202026-01-14T21:22:45.820ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = cc4593f4-c34b-4ef1-adc7-afafc3f08db0 uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
11212026-01-14T21:22:45.820ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = cc4593f4-c34b-4ef1-adc7-afafc3f08db0 uri = /sp/switch/0/component/sp/caboose?firmware_slot=1 version = 3.0.0
11222026-01-14T21:22:45.820ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 41 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
11232026-01-14T21:22:45.821ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 57 interface = fake-sled0 peer = [::1]:37600
11242026-01-14T21:22:45.821ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
11252026-01-14T21:22:45.821ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 58 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
11262026-01-14T21:22:45.821ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 57 interface = fake-sled1 peer = [::1]:54292
11272026-01-14T21:22:45.821ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
11282026-01-14T21:22:45.821ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 58 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
11292026-01-14T21:22:45.821ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
11302026-01-14T21:22:45.824ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
11312026-01-14T21:22:45.824ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
11322026-01-14T21:22:45.824ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
11332026-01-14T21:22:45.830ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
11342026-01-14T21:22:45.830ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
11352026-01-14T21:22:45.830ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
11362026-01-14T21:22:45.830ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
11372026-01-14T21:22:45.831ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
11382026-01-14T21:22:45.831ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
11392026-01-14T21:22:45.831ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
11402026-01-14T21:22:45.831ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
11412026-01-14T21:22:45.831ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 42 } interface = fake-switch0 response = CabooseValue
11422026-01-14T21:22:45.831ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 58 interface = fake-sled0 peer = [::1]:37600
11432026-01-14T21:22:45.831ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
11442026-01-14T21:22:45.831ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 59 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
11452026-01-14T21:22:45.831ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 58 interface = fake-sled1 peer = [::1]:54292
11462026-01-14T21:22:45.831ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
11472026-01-14T21:22:45.831ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 59 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
11482026-01-14T21:22:45.833ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
11492026-01-14T21:22:45.833ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
11502026-01-14T21:22:45.833ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
11512026-01-14T21:22:45.850ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
11522026-01-14T21:22:45.850ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
11532026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
11542026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
11552026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
11562026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
11572026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
11582026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
11592026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
11602026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
11612026-01-14T21:22:45.851ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
11622026-01-14T21:22:45.858ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 43 } interface = fake-switch0 response = CabooseValue
11632026-01-14T21:22:45.858ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 59 interface = fake-sled0 peer = [::1]:37600
11642026-01-14T21:22:45.858ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
11652026-01-14T21:22:45.858ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 60 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
11662026-01-14T21:22:45.858ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 59 interface = fake-sled1 peer = [::1]:54292
11672026-01-14T21:22:45.858ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
11682026-01-14T21:22:45.858ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 60 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
11692026-01-14T21:22:45.864ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
11702026-01-14T21:22:45.864ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
11712026-01-14T21:22:45.864ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
11722026-01-14T21:22:45.871ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
11732026-01-14T21:22:45.872ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
11742026-01-14T21:22:45.872ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
11752026-01-14T21:22:45.872ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
11762026-01-14T21:22:45.872ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
11772026-01-14T21:22:45.872ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
11782026-01-14T21:22:45.872ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
11792026-01-14T21:22:45.872ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
11802026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
11812026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
11822026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
11832026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
11842026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
11852026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
11862026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
11872026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
11882026-01-14T21:22:45.873ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 44 } interface = fake-switch0 response = CabooseValue
11892026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 60 interface = fake-sled0 peer = [::1]:37600
11902026-01-14T21:22:45.873ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
11912026-01-14T21:22:45.873ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 61 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
11922026-01-14T21:22:45.873ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 60 interface = fake-sled1 peer = [::1]:54292
11932026-01-14T21:22:45.873ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
11942026-01-14T21:22:45.873ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 61 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
11952026-01-14T21:22:45.880ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
11962026-01-14T21:22:45.880ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
11972026-01-14T21:22:45.880ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
11982026-01-14T21:22:45.903ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
11992026-01-14T21:22:45.903ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
12002026-01-14T21:22:45.903ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
12012026-01-14T21:22:45.903ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
12022026-01-14T21:22:45.903ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
12032026-01-14T21:22:45.903ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
12042026-01-14T21:22:45.903ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
12052026-01-14T21:22:45.903ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
12062026-01-14T21:22:45.904ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
12072026-01-14T21:22:45.904ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
12082026-01-14T21:22:45.904ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
12092026-01-14T21:22:45.906ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 45 } interface = fake-switch0 response = CabooseValue
12102026-01-14T21:22:45.934ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 61 interface = fake-sled0 peer = [::1]:37600
12112026-01-14T21:22:45.934ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
12122026-01-14T21:22:45.934ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 62 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
12132026-01-14T21:22:45.935ZDEBGtest_vpc_firewall (ManagementSwitch): ignoring unexpected response id = 61 interface = fake-sled1 peer = [::1]:54292
12142026-01-14T21:22:45.935ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 2 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
12152026-01-14T21:22:45.935ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 62 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
12162026-01-14T21:22:45.935ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
12172026-01-14T21:22:45.935ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
12182026-01-14T21:22:45.935ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
12192026-01-14T21:22:45.943ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
12202026-01-14T21:22:45.957ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
12212026-01-14T21:22:45.959ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 46 } interface = fake-switch0 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
12222026-01-14T21:22:45.959ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unexpected RPC response interface = fake-sled0 message = Message { header: Header { version: 22, message_id: 62 }, kind: SpResponse(SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })) }
12232026-01-14T21:22:45.959ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unexpected RPC response interface = fake-sled1 message = Message { header: Header { version: 22, message_id: 62 }, kind: SpResponse(SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })) }
12242026-01-14T21:22:45.959ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
12252026-01-14T21:22:45.960ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 47 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
12262026-01-14T21:22:45.962ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 142343 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = cc4593f4-c34b-4ef1-adc7-afafc3f08db0 response_code = 200 uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
12272026-01-14T21:22:45.978ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = f9e7f48c-3a28-457e-b4f0-e82068f38fdd uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
12282026-01-14T21:22:45.978ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = f9e7f48c-3a28-457e-b4f0-e82068f38fdd uri = /sp/switch/0/component/rot/caboose?firmware_slot=0 version = 3.0.0
12292026-01-14T21:22:45.978ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
12302026-01-14T21:22:45.983ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 48 } interface = fake-switch0 response = CabooseValue
12312026-01-14T21:22:45.983ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
12322026-01-14T21:22:45.983ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 49 } interface = fake-switch0 response = CabooseValue
12332026-01-14T21:22:45.983ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
12342026-01-14T21:22:45.983ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 50 } interface = fake-switch0 response = CabooseValue
12352026-01-14T21:22:45.984ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
12362026-01-14T21:22:45.984ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 51 } interface = fake-switch0 response = CabooseValue
12372026-01-14T21:22:45.984ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
12382026-01-14T21:22:45.984ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 52 } interface = fake-switch0 response = CabooseValue
12392026-01-14T21:22:45.984ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
12402026-01-14T21:22:45.984ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 53 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
12412026-01-14T21:22:45.984ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 6437 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = f9e7f48c-3a28-457e-b4f0-e82068f38fdd response_code = 200 uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
12422026-01-14T21:22:46.004ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 5bbec51d-b27d-4ed1-bf3a-672fe1a53d09 uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
12432026-01-14T21:22:46.005ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 5bbec51d-b27d-4ed1-bf3a-672fe1a53d09 uri = /sp/switch/0/component/rot/caboose?firmware_slot=1 version = 3.0.0
12442026-01-14T21:22:46.005ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
12452026-01-14T21:22:46.005ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 54 } interface = fake-switch0 response = CabooseValue
12462026-01-14T21:22:46.006ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
12472026-01-14T21:22:46.006ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 55 } interface = fake-switch0 response = CabooseValue
12482026-01-14T21:22:46.006ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
12492026-01-14T21:22:46.006ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 56 } interface = fake-switch0 response = CabooseValue
12502026-01-14T21:22:46.006ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
12512026-01-14T21:22:46.006ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 57 } interface = fake-switch0 response = CabooseValue
12522026-01-14T21:22:46.006ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
12532026-01-14T21:22:46.007ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 58 } interface = fake-switch0 response = CabooseValue
12542026-01-14T21:22:46.007ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
12552026-01-14T21:22:46.007ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 59 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
12562026-01-14T21:22:46.007ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2742 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 5bbec51d-b27d-4ed1-bf3a-672fe1a53d09 response_code = 200 uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
12572026-01-14T21:22:46.009ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e55a845-c6bc-4738-911a-44e2424eccbd uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
12582026-01-14T21:22:46.016ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e55a845-c6bc-4738-911a-44e2424eccbd uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0 version = 3.0.0
12592026-01-14T21:22:46.016ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
12602026-01-14T21:22:46.016ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 60 } interface = fake-switch0 response = CabooseValue
12612026-01-14T21:22:46.017ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
12622026-01-14T21:22:46.024ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 61 } interface = fake-switch0 response = CabooseValue
12632026-01-14T21:22:46.024ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
12642026-01-14T21:22:46.027ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 62 } interface = fake-switch0 response = CabooseValue
12652026-01-14T21:22:46.027ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 63 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
12662026-01-14T21:22:46.057ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 63 } interface = fake-switch0 response = CabooseValue
12672026-01-14T21:22:46.058ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 64 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
12682026-01-14T21:22:46.059ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 64 } interface = fake-switch0 response = CabooseValue
12692026-01-14T21:22:46.059ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 65 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
12702026-01-14T21:22:46.074ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 65 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
12712026-01-14T21:22:46.090ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 80864 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e55a845-c6bc-4738-911a-44e2424eccbd response_code = 200 uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
12722026-01-14T21:22:46.092ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 80fe2562-231d-4e5d-861a-e15eb57f339e uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
12732026-01-14T21:22:46.092ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 80fe2562-231d-4e5d-861a-e15eb57f339e uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1 version = 3.0.0
12742026-01-14T21:22:46.093ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 66 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
12752026-01-14T21:22:46.093ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 66 } interface = fake-switch0 response = CabooseValue
12762026-01-14T21:22:46.099ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 67 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
12772026-01-14T21:22:46.135ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 67 } interface = fake-switch0 response = CabooseValue
12782026-01-14T21:22:46.136ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 68 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
12792026-01-14T21:22:46.137ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 68 } interface = fake-switch0 response = CabooseValue
12802026-01-14T21:22:46.149ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 69 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
12812026-01-14T21:22:46.153ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 69 } interface = fake-switch0 response = CabooseValue
12822026-01-14T21:22:46.154ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 70 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
12832026-01-14T21:22:46.157ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 70 } interface = fake-switch0 response = CabooseValue
12842026-01-14T21:22:46.157ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 71 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
12852026-01-14T21:22:46.158ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 71 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
12862026-01-14T21:22:46.158ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 66376 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 80fe2562-231d-4e5d-861a-e15eb57f339e response_code = 200 uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
12872026-01-14T21:22:46.172ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 4cbcaa6e-5c70-4478-b102-519d801e2362 uri = /sp/switch/0/component/rot/cmpa
12882026-01-14T21:22:46.172ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 4cbcaa6e-5c70-4478-b102-519d801e2362 uri = /sp/switch/0/component/rot/cmpa version = 3.0.0
12892026-01-14T21:22:46.173ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 72 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
12902026-01-14T21:22:46.174ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 72 } interface = fake-switch0 response = ReadRot(Ok)
12912026-01-14T21:22:46.175ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 3094 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 4cbcaa6e-5c70-4478-b102-519d801e2362 response_code = 200 uri = /sp/switch/0/component/rot/cmpa
12922026-01-14T21:22:46.181ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 86049176-fabe-4705-9dd8-4b67c62d6f2f uri = /sp/switch/0/component/rot/cfpa
12932026-01-14T21:22:46.181ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 86049176-fabe-4705-9dd8-4b67c62d6f2f uri = /sp/switch/0/component/rot/cfpa version = 3.0.0
12942026-01-14T21:22:46.182ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 73 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
12952026-01-14T21:22:46.301ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 73 } interface = fake-switch0 response = ReadRot(Ok)
12962026-01-14T21:22:46.301ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 120068 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 86049176-fabe-4705-9dd8-4b67c62d6f2f response_code = 200 uri = /sp/switch/0/component/rot/cfpa
12972026-01-14T21:22:46.303ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 744c586d-3c27-4430-9b79-06371205dc04 uri = /sp/switch/0/component/rot/cfpa
12982026-01-14T21:22:46.303ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 744c586d-3c27-4430-9b79-06371205dc04 uri = /sp/switch/0/component/rot/cfpa version = 3.0.0
12992026-01-14T21:22:46.304ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 74 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
13002026-01-14T21:22:46.304ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 74 } interface = fake-switch0 response = ReadRot(Ok)
13012026-01-14T21:22:46.305ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1524 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 744c586d-3c27-4430-9b79-06371205dc04 response_code = 200 uri = /sp/switch/0/component/rot/cfpa
13022026-01-14T21:22:46.306ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 03f59a31-fa77-4498-b319-a8741b02f318 uri = /sp/switch/0/component/rot/cfpa
13032026-01-14T21:22:46.306ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 03f59a31-fa77-4498-b319-a8741b02f318 uri = /sp/switch/0/component/rot/cfpa version = 3.0.0
13042026-01-14T21:22:46.306ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 75 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
13052026-01-14T21:22:46.306ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 75 } interface = fake-switch0 response = ReadRot(Ok)
13062026-01-14T21:22:46.307ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 855 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 03f59a31-fa77-4498-b319-a8741b02f318 response_code = 200 uri = /sp/switch/0/component/rot/cfpa
13072026-01-14T21:22:46.307ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 90daaac7-617e-4dde-ac0d-dc8ceea369a4 uri = /sp/switch/1
13082026-01-14T21:22:46.307ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 90daaac7-617e-4dde-ac0d-dc8ceea369a4 uri = /sp/switch/1 version = 3.0.0
13092026-01-14T21:22:46.308ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 17 }, kind: MgsRequest(SpState) }
13102026-01-14T21:22:46.308ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
13112026-01-14T21:22:46.308ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 17 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
13122026-01-14T21:22:46.308ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 18 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
13132026-01-14T21:22:46.309ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 18 } interface = fake-switch1 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
13142026-01-14T21:22:46.310ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2153 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 90daaac7-617e-4dde-ac0d-dc8ceea369a4 response_code = 200 uri = /sp/switch/1
13152026-01-14T21:22:46.311ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 26c4447f-a00f-4923-ba70-ec8f43a11d54 uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
13162026-01-14T21:22:46.311ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 26c4447f-a00f-4923-ba70-ec8f43a11d54 uri = /sp/switch/1/component/sp/caboose?firmware_slot=0 version = 3.0.0
13172026-01-14T21:22:46.311ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 19 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
13182026-01-14T21:22:46.312ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 19 } interface = fake-switch1 response = CabooseValue
13192026-01-14T21:22:46.312ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 20 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
13202026-01-14T21:22:46.325ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 20 } interface = fake-switch1 response = CabooseValue
13212026-01-14T21:22:46.325ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 21 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
13222026-01-14T21:22:46.328ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 21 } interface = fake-switch1 response = CabooseValue
13232026-01-14T21:22:46.328ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 22 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
13242026-01-14T21:22:46.328ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 22 } interface = fake-switch1 response = CabooseValue
13252026-01-14T21:22:46.328ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 23 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
13262026-01-14T21:22:46.328ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 23 } interface = fake-switch1 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
13272026-01-14T21:22:46.328ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 24 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
13282026-01-14T21:22:46.332ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 24 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
13292026-01-14T21:22:46.332ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 20275 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 26c4447f-a00f-4923-ba70-ec8f43a11d54 response_code = 200 uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
13302026-01-14T21:22:46.334ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = b0e0e98b-9c71-43cb-96d4-bec98288b854 uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
13312026-01-14T21:22:46.334ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = b0e0e98b-9c71-43cb-96d4-bec98288b854 uri = /sp/switch/1/component/sp/caboose?firmware_slot=1 version = 3.0.0
13322026-01-14T21:22:46.342ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 25 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
13332026-01-14T21:22:46.342ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 25 } interface = fake-switch1 response = CabooseValue
13342026-01-14T21:22:46.342ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 26 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
13352026-01-14T21:22:46.343ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 26 } interface = fake-switch1 response = CabooseValue
13362026-01-14T21:22:46.343ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 27 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
13372026-01-14T21:22:46.343ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 27 } interface = fake-switch1 response = CabooseValue
13382026-01-14T21:22:46.343ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 28 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
13392026-01-14T21:22:46.343ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 28 } interface = fake-switch1 response = CabooseValue
13402026-01-14T21:22:46.343ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 29 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
13412026-01-14T21:22:46.344ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 29 } interface = fake-switch1 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
13422026-01-14T21:22:46.344ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 30 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
13432026-01-14T21:22:46.344ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 30 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
13442026-01-14T21:22:46.344ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 10447 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = b0e0e98b-9c71-43cb-96d4-bec98288b854 response_code = 200 uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
13452026-01-14T21:22:46.348ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1a3f23e3-f1f4-4648-8cdb-0f5c628f67b5 uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
13462026-01-14T21:22:46.348ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1a3f23e3-f1f4-4648-8cdb-0f5c628f67b5 uri = /sp/switch/1/component/rot/caboose?firmware_slot=0 version = 3.0.0
13472026-01-14T21:22:46.349ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 31 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
13482026-01-14T21:22:46.351ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 31 } interface = fake-switch1 response = CabooseValue
13492026-01-14T21:22:46.351ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 32 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
13502026-01-14T21:22:46.351ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 32 } interface = fake-switch1 response = CabooseValue
13512026-01-14T21:22:46.351ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 33 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
13522026-01-14T21:22:46.351ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 33 } interface = fake-switch1 response = CabooseValue
13532026-01-14T21:22:46.352ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 34 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
13542026-01-14T21:22:46.352ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 34 } interface = fake-switch1 response = CabooseValue
13552026-01-14T21:22:46.352ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 35 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
13562026-01-14T21:22:46.352ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 35 } interface = fake-switch1 response = CabooseValue
13572026-01-14T21:22:46.352ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 36 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
13582026-01-14T21:22:46.352ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 36 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
13592026-01-14T21:22:46.352ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4319 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1a3f23e3-f1f4-4648-8cdb-0f5c628f67b5 response_code = 200 uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
13602026-01-14T21:22:46.353ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fd5a1b47-54eb-43f0-8bbf-c71ac68e8ce3 uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
13612026-01-14T21:22:46.354ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fd5a1b47-54eb-43f0-8bbf-c71ac68e8ce3 uri = /sp/switch/1/component/rot/caboose?firmware_slot=1 version = 3.0.0
13622026-01-14T21:22:46.354ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 37 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
13632026-01-14T21:22:46.354ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 37 } interface = fake-switch1 response = CabooseValue
13642026-01-14T21:22:46.354ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 38 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
13652026-01-14T21:22:46.354ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 38 } interface = fake-switch1 response = CabooseValue
13662026-01-14T21:22:46.354ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 39 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
13672026-01-14T21:22:46.355ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 39 } interface = fake-switch1 response = CabooseValue
13682026-01-14T21:22:46.355ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 40 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
13692026-01-14T21:22:46.355ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 40 } interface = fake-switch1 response = CabooseValue
13702026-01-14T21:22:46.355ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 41 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
13712026-01-14T21:22:46.355ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 41 } interface = fake-switch1 response = CabooseValue
13722026-01-14T21:22:46.355ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 42 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
13732026-01-14T21:22:46.355ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 42 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
13742026-01-14T21:22:46.357ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 3052 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fd5a1b47-54eb-43f0-8bbf-c71ac68e8ce3 response_code = 200 uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
13752026-01-14T21:22:46.358ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = f24046fc-ef42-4cdc-b5c4-76a5f395ae9a uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
13762026-01-14T21:22:46.358ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = f24046fc-ef42-4cdc-b5c4-76a5f395ae9a uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0 version = 3.0.0
13772026-01-14T21:22:46.358ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 43 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
13782026-01-14T21:22:46.358ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 43 } interface = fake-switch1 response = CabooseValue
13792026-01-14T21:22:46.358ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 44 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
13802026-01-14T21:22:46.358ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 44 } interface = fake-switch1 response = CabooseValue
13812026-01-14T21:22:46.358ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 45 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
13822026-01-14T21:22:46.358ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 45 } interface = fake-switch1 response = CabooseValue
13832026-01-14T21:22:46.358ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 46 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
13842026-01-14T21:22:46.359ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 46 } interface = fake-switch1 response = CabooseValue
13852026-01-14T21:22:46.359ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 47 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
13862026-01-14T21:22:46.359ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 47 } interface = fake-switch1 response = CabooseValue
13872026-01-14T21:22:46.359ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 48 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
13882026-01-14T21:22:46.359ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 48 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
13892026-01-14T21:22:46.359ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1460 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = f24046fc-ef42-4cdc-b5c4-76a5f395ae9a response_code = 200 uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
13902026-01-14T21:22:46.360ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c30efa44-8cb4-4057-a886-80ca508920ff uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
13912026-01-14T21:22:46.360ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c30efa44-8cb4-4057-a886-80ca508920ff uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1 version = 3.0.0
13922026-01-14T21:22:46.360ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 49 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
13932026-01-14T21:22:46.360ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 49 } interface = fake-switch1 response = CabooseValue
13942026-01-14T21:22:46.360ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 50 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
13952026-01-14T21:22:46.360ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 50 } interface = fake-switch1 response = CabooseValue
13962026-01-14T21:22:46.360ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 51 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
13972026-01-14T21:22:46.361ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 51 } interface = fake-switch1 response = CabooseValue
13982026-01-14T21:22:46.361ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 52 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
13992026-01-14T21:22:46.361ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 52 } interface = fake-switch1 response = CabooseValue
14002026-01-14T21:22:46.361ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 53 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
14012026-01-14T21:22:46.361ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 53 } interface = fake-switch1 response = CabooseValue
14022026-01-14T21:22:46.361ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 54 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
14032026-01-14T21:22:46.361ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 54 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
14042026-01-14T21:22:46.361ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1619 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c30efa44-8cb4-4057-a886-80ca508920ff response_code = 200 uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
14052026-01-14T21:22:46.374ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e219a02-c9e4-42ba-8e36-ae8e84ecdd58 uri = /sp/switch/1/component/rot/cmpa
14062026-01-14T21:22:46.374ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e219a02-c9e4-42ba-8e36-ae8e84ecdd58 uri = /sp/switch/1/component/rot/cmpa version = 3.0.0
14072026-01-14T21:22:46.375ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 55 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
14082026-01-14T21:22:46.376ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 55 } interface = fake-switch1 response = ReadRot(Ok)
14092026-01-14T21:22:46.376ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2152 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e219a02-c9e4-42ba-8e36-ae8e84ecdd58 response_code = 200 uri = /sp/switch/1/component/rot/cmpa
14102026-01-14T21:22:46.377ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = d6aada16-7d05-43b4-b3e1-5cac040a533c uri = /sp/switch/1/component/rot/cfpa
14112026-01-14T21:22:46.378ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = d6aada16-7d05-43b4-b3e1-5cac040a533c uri = /sp/switch/1/component/rot/cfpa version = 3.0.0
14122026-01-14T21:22:46.378ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 56 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
14132026-01-14T21:22:46.378ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 56 } interface = fake-switch1 response = ReadRot(Ok)
14142026-01-14T21:22:46.378ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 743 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = d6aada16-7d05-43b4-b3e1-5cac040a533c response_code = 200 uri = /sp/switch/1/component/rot/cfpa
14152026-01-14T21:22:46.379ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 588c4a4e-ea84-49b3-bdc2-3f3f46ea6dc1 uri = /sp/switch/1/component/rot/cfpa
14162026-01-14T21:22:46.379ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 588c4a4e-ea84-49b3-bdc2-3f3f46ea6dc1 uri = /sp/switch/1/component/rot/cfpa version = 3.0.0
14172026-01-14T21:22:46.379ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 57 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
14182026-01-14T21:22:46.380ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 57 } interface = fake-switch1 response = ReadRot(Ok)
14192026-01-14T21:22:46.380ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 822 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 588c4a4e-ea84-49b3-bdc2-3f3f46ea6dc1 response_code = 200 uri = /sp/switch/1/component/rot/cfpa
14202026-01-14T21:22:46.381ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 446fa1e2-e51f-48cc-ba84-83c16ba17168 uri = /sp/switch/1/component/rot/cfpa
14212026-01-14T21:22:46.381ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 446fa1e2-e51f-48cc-ba84-83c16ba17168 uri = /sp/switch/1/component/rot/cfpa version = 3.0.0
14222026-01-14T21:22:46.382ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 58 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
14232026-01-14T21:22:46.382ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 58 } interface = fake-switch1 response = ReadRot(Ok)
14242026-01-14T21:22:46.382ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 821 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 446fa1e2-e51f-48cc-ba84-83c16ba17168 response_code = 200 uri = /sp/switch/1/component/rot/cfpa
14252026-01-14T21:22:46.384ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 4e06cfbd-513e-4b7c-bee2-1a49699e426b uri = /sp/sled/0
14262026-01-14T21:22:46.384ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 4e06cfbd-513e-4b7c-bee2-1a49699e426b uri = /sp/sled/0 version = 3.0.0
14272026-01-14T21:22:46.384ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 63 }, kind: MgsRequest(SpState) }
14282026-01-14T21:22:46.385ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
14292026-01-14T21:22:46.385ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 63 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
14302026-01-14T21:22:46.385ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 64 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
14312026-01-14T21:22:46.385ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 64 } interface = fake-sled0 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
14322026-01-14T21:22:46.385ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1053 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 4e06cfbd-513e-4b7c-bee2-1a49699e426b response_code = 200 uri = /sp/sled/0
14332026-01-14T21:22:46.386ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fadf0876-d0e5-4961-a113-ae17a1914a59 uri = /sp/sled/0/component/host-boot-flash/active-slot
14342026-01-14T21:22:46.386ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fadf0876-d0e5-4961-a113-ae17a1914a59 uri = /sp/sled/0/component/host-boot-flash/active-slot version = 3.0.0
14352026-01-14T21:22:46.386ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 65 }, kind: MgsRequest(ComponentGetActiveSlot(SpComponent { id: "host-boot-flash" })) }
14362026-01-14T21:22:46.386ZDEBGtest_vpc_firewall (SpComponent { id: "host-boot-flash" }): asked for component active slot slot = gimlet 0
14372026-01-14T21:22:46.386ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 65 } interface = fake-sled0 response = ComponentActiveSlot(0)
14382026-01-14T21:22:46.387ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1089 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fadf0876-d0e5-4961-a113-ae17a1914a59 response_code = 200 uri = /sp/sled/0/component/host-boot-flash/active-slot
14392026-01-14T21:22:46.391ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 8294fd5d-f2ae-46a7-8a8f-07580fec1d77 uri = /sp/sled/0/component/host-boot-flash/hash/0
14402026-01-14T21:22:46.391ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 8294fd5d-f2ae-46a7-8a8f-07580fec1d77 uri = /sp/sled/0/component/host-boot-flash/hash/0 version = 3.0.0
14412026-01-14T21:22:46.392ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 66 }, kind: MgsRequest(GetHostFlashHash { slot: 0 }) }
14422026-01-14T21:22:46.392ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 66 } interface = fake-sled0 response = HostFlashHash([53, 107, 239, 110, 220, 143, 200, 15, 34, 112, 182, 59, 102, 171, 195, 123, 41, 60, 85, 66, 172, 201, 244, 15, 90, 150, 217, 20, 162, 63, 97, 19])
14432026-01-14T21:22:46.393ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2261 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 8294fd5d-f2ae-46a7-8a8f-07580fec1d77 response_code = 200 uri = /sp/sled/0/component/host-boot-flash/hash/0
14442026-01-14T21:22:46.435ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c7ed00d2-2c7a-42bb-b058-6ecd9b34d7a6 uri = /sp/sled/0/component/host-boot-flash/hash/1
14452026-01-14T21:22:46.436ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c7ed00d2-2c7a-42bb-b058-6ecd9b34d7a6 uri = /sp/sled/0/component/host-boot-flash/hash/1 version = 3.0.0
14462026-01-14T21:22:46.437ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 67 }, kind: MgsRequest(GetHostFlashHash { slot: 1 }) }
14472026-01-14T21:22:46.441ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 67 } interface = fake-sled0 response = HostFlashHash([11, 47, 169, 143, 81, 51, 178, 136, 162, 190, 126, 80, 46, 170, 224, 134, 194, 112, 189, 43, 164, 70, 214, 26, 90, 235, 161, 253, 140, 26, 154, 197])
14482026-01-14T21:22:46.441ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 6099 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c7ed00d2-2c7a-42bb-b058-6ecd9b34d7a6 response_code = 200 uri = /sp/sled/0/component/host-boot-flash/hash/1
14492026-01-14T21:22:46.455ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = ee2045cb-3c12-4e75-8c24-4506f47ade6f uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
14502026-01-14T21:22:46.455ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = ee2045cb-3c12-4e75-8c24-4506f47ade6f uri = /sp/sled/0/component/sp/caboose?firmware_slot=0 version = 3.0.0
14512026-01-14T21:22:46.455ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 68 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
14522026-01-14T21:22:46.456ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 68 } interface = fake-sled0 response = CabooseValue
14532026-01-14T21:22:46.456ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 69 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
14542026-01-14T21:22:46.456ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 69 } interface = fake-sled0 response = CabooseValue
14552026-01-14T21:22:46.456ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 70 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
14562026-01-14T21:22:46.457ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 70 } interface = fake-sled0 response = CabooseValue
14572026-01-14T21:22:46.457ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 71 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
14582026-01-14T21:22:46.472ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 71 } interface = fake-sled0 response = CabooseValue
14592026-01-14T21:22:46.472ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 72 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
14602026-01-14T21:22:46.472ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 72 } interface = fake-sled0 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
14612026-01-14T21:22:46.472ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 73 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
14622026-01-14T21:22:46.473ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 73 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
14632026-01-14T21:22:46.473ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 18230 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = ee2045cb-3c12-4e75-8c24-4506f47ade6f response_code = 200 uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
14642026-01-14T21:22:46.478ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 25462fa0-703f-4757-b0d4-6a38a61e93fd uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
14652026-01-14T21:22:46.479ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 25462fa0-703f-4757-b0d4-6a38a61e93fd uri = /sp/sled/0/component/sp/caboose?firmware_slot=1 version = 3.0.0
14662026-01-14T21:22:46.479ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 74 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
14672026-01-14T21:22:46.480ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 74 } interface = fake-sled0 response = CabooseValue
14682026-01-14T21:22:46.480ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 75 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
14692026-01-14T21:22:46.481ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 75 } interface = fake-sled0 response = CabooseValue
14702026-01-14T21:22:46.481ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 76 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
14712026-01-14T21:22:46.481ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 76 } interface = fake-sled0 response = CabooseValue
14722026-01-14T21:22:46.481ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 77 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
14732026-01-14T21:22:46.481ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 77 } interface = fake-sled0 response = CabooseValue
14742026-01-14T21:22:46.481ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 78 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
14752026-01-14T21:22:46.481ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 78 } interface = fake-sled0 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
14762026-01-14T21:22:46.481ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 79 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
14772026-01-14T21:22:46.482ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 79 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
14782026-01-14T21:22:46.482ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 3913 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 25462fa0-703f-4757-b0d4-6a38a61e93fd response_code = 200 uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
14792026-01-14T21:22:46.484ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1486c6e5-63de-4311-b9d6-a6452da426be uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
14802026-01-14T21:22:46.484ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1486c6e5-63de-4311-b9d6-a6452da426be uri = /sp/sled/0/component/rot/caboose?firmware_slot=0 version = 3.0.0
14812026-01-14T21:22:46.484ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 80 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
14822026-01-14T21:22:46.484ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 80 } interface = fake-sled0 response = CabooseValue
14832026-01-14T21:22:46.484ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 81 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
14842026-01-14T21:22:46.484ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 81 } interface = fake-sled0 response = CabooseValue
14852026-01-14T21:22:46.485ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 82 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
14862026-01-14T21:22:46.494ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 82 } interface = fake-sled0 response = CabooseValue
14872026-01-14T21:22:46.494ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 83 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
14882026-01-14T21:22:46.495ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 83 } interface = fake-sled0 response = CabooseValue
14892026-01-14T21:22:46.495ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 84 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
14902026-01-14T21:22:46.495ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 84 } interface = fake-sled0 response = CabooseValue
14912026-01-14T21:22:46.501ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 85 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
14922026-01-14T21:22:46.505ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 85 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
14932026-01-14T21:22:46.505ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 21734 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1486c6e5-63de-4311-b9d6-a6452da426be response_code = 200 uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
14942026-01-14T21:22:46.509ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 767ce8ae-86a2-468d-ad27-d556b1aa7c4c uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
14952026-01-14T21:22:46.510ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 767ce8ae-86a2-468d-ad27-d556b1aa7c4c uri = /sp/sled/0/component/rot/caboose?firmware_slot=1 version = 3.0.0
14962026-01-14T21:22:46.510ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 86 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
14972026-01-14T21:22:46.510ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 86 } interface = fake-sled0 response = CabooseValue
14982026-01-14T21:22:46.510ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 87 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
14992026-01-14T21:22:46.511ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 87 } interface = fake-sled0 response = CabooseValue
15002026-01-14T21:22:46.511ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 88 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
15012026-01-14T21:22:46.511ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 88 } interface = fake-sled0 response = CabooseValue
15022026-01-14T21:22:46.511ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 89 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
15032026-01-14T21:22:46.511ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 89 } interface = fake-sled0 response = CabooseValue
15042026-01-14T21:22:46.511ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 90 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
15052026-01-14T21:22:46.512ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 90 } interface = fake-sled0 response = CabooseValue
15062026-01-14T21:22:46.512ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 91 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
15072026-01-14T21:22:46.512ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 91 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
15082026-01-14T21:22:46.512ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 3064 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 767ce8ae-86a2-468d-ad27-d556b1aa7c4c response_code = 200 uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
15092026-01-14T21:22:46.514ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 2041018c-4263-4764-aa02-38c0a6cffae0 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
15102026-01-14T21:22:46.514ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 2041018c-4263-4764-aa02-38c0a6cffae0 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0 version = 3.0.0
15112026-01-14T21:22:46.514ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 92 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
15122026-01-14T21:22:46.515ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 92 } interface = fake-sled0 response = CabooseValue
15132026-01-14T21:22:46.515ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 93 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
15142026-01-14T21:22:46.515ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 93 } interface = fake-sled0 response = CabooseValue
15152026-01-14T21:22:46.515ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 94 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
15162026-01-14T21:22:46.515ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 94 } interface = fake-sled0 response = CabooseValue
15172026-01-14T21:22:46.515ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 95 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
15182026-01-14T21:22:46.516ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 95 } interface = fake-sled0 response = CabooseValue
15192026-01-14T21:22:46.517ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 96 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
15202026-01-14T21:22:46.518ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 96 } interface = fake-sled0 response = CabooseValue
15212026-01-14T21:22:46.518ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 97 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
15222026-01-14T21:22:46.518ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 97 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
15232026-01-14T21:22:46.518ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4127 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 2041018c-4263-4764-aa02-38c0a6cffae0 response_code = 200 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
15242026-01-14T21:22:46.519ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = b5b509b1-d148-4100-a966-68c555448c95 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
15252026-01-14T21:22:46.519ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = b5b509b1-d148-4100-a966-68c555448c95 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1 version = 3.0.0
15262026-01-14T21:22:46.519ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 98 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
15272026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 98 } interface = fake-sled0 response = CabooseValue
15282026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 99 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
15292026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 99 } interface = fake-sled0 response = CabooseValue
15302026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 100 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
15312026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 100 } interface = fake-sled0 response = CabooseValue
15322026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 101 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
15332026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 101 } interface = fake-sled0 response = CabooseValue
15342026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 102 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
15352026-01-14T21:22:46.520ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 102 } interface = fake-sled0 response = CabooseValue
15362026-01-14T21:22:46.521ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 103 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
15372026-01-14T21:22:46.522ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 103 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
15382026-01-14T21:22:46.522ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2762 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = b5b509b1-d148-4100-a966-68c555448c95 response_code = 200 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
15392026-01-14T21:22:46.524ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = a7cc7289-0d3b-4a26-b40e-62acebd20d59 uri = /sp/sled/0/component/rot/cmpa
15402026-01-14T21:22:46.524ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = a7cc7289-0d3b-4a26-b40e-62acebd20d59 uri = /sp/sled/0/component/rot/cmpa version = 3.0.0
15412026-01-14T21:22:46.524ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 104 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
15422026-01-14T21:22:46.524ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 104 } interface = fake-sled0 response = ReadRot(Ok)
15432026-01-14T21:22:46.524ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 887 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = a7cc7289-0d3b-4a26-b40e-62acebd20d59 response_code = 200 uri = /sp/sled/0/component/rot/cmpa
15442026-01-14T21:22:46.525ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = aa01bb71-4ac2-42bc-bf58-088740f2913c uri = /sp/sled/0/component/rot/cfpa
15452026-01-14T21:22:46.525ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = aa01bb71-4ac2-42bc-bf58-088740f2913c uri = /sp/sled/0/component/rot/cfpa version = 3.0.0
15462026-01-14T21:22:46.526ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 105 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
15472026-01-14T21:22:46.526ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 105 } interface = fake-sled0 response = ReadRot(Ok)
15482026-01-14T21:22:46.526ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 775 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = aa01bb71-4ac2-42bc-bf58-088740f2913c response_code = 200 uri = /sp/sled/0/component/rot/cfpa
15492026-01-14T21:22:46.569ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e0e3e45-5b7b-44c4-901b-99eaa2c83d42 uri = /sp/sled/0/component/rot/cfpa
15502026-01-14T21:22:46.569ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e0e3e45-5b7b-44c4-901b-99eaa2c83d42 uri = /sp/sled/0/component/rot/cfpa version = 3.0.0
15512026-01-14T21:22:46.569ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 106 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
15522026-01-14T21:22:46.569ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 106 } interface = fake-sled0 response = ReadRot(Ok)
15532026-01-14T21:22:46.570ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1136 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 9e0e3e45-5b7b-44c4-901b-99eaa2c83d42 response_code = 200 uri = /sp/sled/0/component/rot/cfpa
15542026-01-14T21:22:46.571ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1584ab13-93d1-4370-ac54-a085d38d8c4f uri = /sp/sled/0/component/rot/cfpa
15552026-01-14T21:22:46.571ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1584ab13-93d1-4370-ac54-a085d38d8c4f uri = /sp/sled/0/component/rot/cfpa version = 3.0.0
15562026-01-14T21:22:46.571ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 107 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
15572026-01-14T21:22:46.571ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 107 } interface = fake-sled0 response = ReadRot(Ok)
15582026-01-14T21:22:46.571ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 896 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 1584ab13-93d1-4370-ac54-a085d38d8c4f response_code = 200 uri = /sp/sled/0/component/rot/cfpa
15592026-01-14T21:22:46.572ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = af0d9be7-b308-4fd3-9e87-72642983b675 uri = /sp/sled/1
15602026-01-14T21:22:46.572ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = af0d9be7-b308-4fd3-9e87-72642983b675 uri = /sp/sled/1 version = 3.0.0
15612026-01-14T21:22:46.573ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 63 }, kind: MgsRequest(SpState) }
15622026-01-14T21:22:46.573ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
15632026-01-14T21:22:46.574ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 63 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
15642026-01-14T21:22:46.574ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 64 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
15652026-01-14T21:22:46.574ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 64 } interface = fake-sled1 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
15662026-01-14T21:22:46.574ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1767 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = af0d9be7-b308-4fd3-9e87-72642983b675 response_code = 200 uri = /sp/sled/1
15672026-01-14T21:22:46.575ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 269913b9-5e6f-4e11-b328-23beeaff50fa uri = /sp/sled/1/component/host-boot-flash/active-slot
15682026-01-14T21:22:46.575ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 269913b9-5e6f-4e11-b328-23beeaff50fa uri = /sp/sled/1/component/host-boot-flash/active-slot version = 3.0.0
15692026-01-14T21:22:46.575ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 65 }, kind: MgsRequest(ComponentGetActiveSlot(SpComponent { id: "host-boot-flash" })) }
15702026-01-14T21:22:46.575ZDEBGtest_vpc_firewall (SpComponent { id: "host-boot-flash" }): asked for component active slot slot = gimlet 1
15712026-01-14T21:22:46.575ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 65 } interface = fake-sled1 response = ComponentActiveSlot(0)
15722026-01-14T21:22:46.576ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 642 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 269913b9-5e6f-4e11-b328-23beeaff50fa response_code = 200 uri = /sp/sled/1/component/host-boot-flash/active-slot
15732026-01-14T21:22:46.576ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 3468c2a0-e143-48b5-b590-549aa8f0d182 uri = /sp/sled/1/component/host-boot-flash/hash/0
15742026-01-14T21:22:46.579ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 3468c2a0-e143-48b5-b590-549aa8f0d182 uri = /sp/sled/1/component/host-boot-flash/hash/0 version = 3.0.0
15752026-01-14T21:22:46.579ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 66 }, kind: MgsRequest(GetHostFlashHash { slot: 0 }) }
15762026-01-14T21:22:46.579ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 66 } interface = fake-sled1 response = HostFlashHash([53, 107, 239, 110, 220, 143, 200, 15, 34, 112, 182, 59, 102, 171, 195, 123, 41, 60, 85, 66, 172, 201, 244, 15, 90, 150, 217, 20, 162, 63, 97, 19])
15772026-01-14T21:22:46.580ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 3410 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 3468c2a0-e143-48b5-b590-549aa8f0d182 response_code = 200 uri = /sp/sled/1/component/host-boot-flash/hash/0
15782026-01-14T21:22:46.581ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = edb0516e-aa0c-44dd-86a8-9a1782af9e5f uri = /sp/sled/1/component/host-boot-flash/hash/1
15792026-01-14T21:22:46.581ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = edb0516e-aa0c-44dd-86a8-9a1782af9e5f uri = /sp/sled/1/component/host-boot-flash/hash/1 version = 3.0.0
15802026-01-14T21:22:46.582ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 67 }, kind: MgsRequest(GetHostFlashHash { slot: 1 }) }
15812026-01-14T21:22:46.583ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 67 } interface = fake-sled1 response = HostFlashHash([11, 47, 169, 143, 81, 51, 178, 136, 162, 190, 126, 80, 46, 170, 224, 134, 194, 112, 189, 43, 164, 70, 214, 26, 90, 235, 161, 253, 140, 26, 154, 197])
15822026-01-14T21:22:46.583ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2124 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = edb0516e-aa0c-44dd-86a8-9a1782af9e5f response_code = 200 uri = /sp/sled/1/component/host-boot-flash/hash/1
15832026-01-14T21:22:46.586ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 65f4736e-2789-4074-8ca2-7941b08a5da8 uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
15842026-01-14T21:22:46.586ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 65f4736e-2789-4074-8ca2-7941b08a5da8 uri = /sp/sled/1/component/sp/caboose?firmware_slot=0 version = 3.0.0
15852026-01-14T21:22:46.586ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 68 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
15862026-01-14T21:22:46.586ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 68 } interface = fake-sled1 response = CabooseValue
15872026-01-14T21:22:46.586ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 69 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
15882026-01-14T21:22:46.586ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 69 } interface = fake-sled1 response = CabooseValue
15892026-01-14T21:22:46.586ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 70 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
15902026-01-14T21:22:46.587ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 70 } interface = fake-sled1 response = CabooseValue
15912026-01-14T21:22:46.587ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 71 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
15922026-01-14T21:22:46.587ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 71 } interface = fake-sled1 response = CabooseValue
15932026-01-14T21:22:46.587ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 72 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
15942026-01-14T21:22:46.587ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 72 } interface = fake-sled1 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
15952026-01-14T21:22:46.588ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 73 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
15962026-01-14T21:22:46.588ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 73 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
15972026-01-14T21:22:46.588ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2795 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 65f4736e-2789-4074-8ca2-7941b08a5da8 response_code = 200 uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
15982026-01-14T21:22:46.590ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 7d07f0ad-ebbe-4264-aafe-67d094e53cc6 uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
15992026-01-14T21:22:46.590ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 7d07f0ad-ebbe-4264-aafe-67d094e53cc6 uri = /sp/sled/1/component/sp/caboose?firmware_slot=1 version = 3.0.0
16002026-01-14T21:22:46.590ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 74 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
16012026-01-14T21:22:46.590ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 74 } interface = fake-sled1 response = CabooseValue
16022026-01-14T21:22:46.590ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 75 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
16032026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 75 } interface = fake-sled1 response = CabooseValue
16042026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 76 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
16052026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 76 } interface = fake-sled1 response = CabooseValue
16062026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 77 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
16072026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 77 } interface = fake-sled1 response = CabooseValue
16082026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 78 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
16092026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 78 } interface = fake-sled1 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
16102026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 79 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
16112026-01-14T21:22:46.591ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 79 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
16122026-01-14T21:22:46.592ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1966 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 7d07f0ad-ebbe-4264-aafe-67d094e53cc6 response_code = 200 uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
16132026-01-14T21:22:46.593ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 90534d2a-d5d9-410e-8b04-65591f7a3e0d uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
16142026-01-14T21:22:46.593ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 90534d2a-d5d9-410e-8b04-65591f7a3e0d uri = /sp/sled/1/component/rot/caboose?firmware_slot=0 version = 3.0.0
16152026-01-14T21:22:46.593ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 80 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
16162026-01-14T21:22:46.593ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 80 } interface = fake-sled1 response = CabooseValue
16172026-01-14T21:22:46.593ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 81 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
16182026-01-14T21:22:46.593ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
16192026-01-14T21:22:46.594ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
16202026-01-14T21:22:46.594ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
16212026-01-14T21:22:46.594ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
16222026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 59 }, kind: MgsRequest(SpState) }
16232026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 76 }, kind: MgsRequest(SpState) }
16242026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 108 }, kind: MgsRequest(SpState) }
16252026-01-14T21:22:46.594ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
16262026-01-14T21:22:46.594ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
16272026-01-14T21:22:46.594ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
16282026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 81 } interface = fake-sled1 response = CabooseValue
16292026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 82 }, kind: MgsRequest(SpState) }
16302026-01-14T21:22:46.594ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
16312026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 76 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
16322026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 59 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
16332026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 108 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
16342026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 77 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
16352026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 60 }, kind: MgsRequest(SpState) }
16362026-01-14T21:22:46.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 109 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
16372026-01-14T21:22:46.595ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
16382026-01-14T21:22:46.595ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
16392026-01-14T21:22:46.595ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
16402026-01-14T21:22:46.595ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
16412026-01-14T21:22:46.595ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
16422026-01-14T21:22:46.595ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 82 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
16432026-01-14T21:22:46.595ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 83 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
16442026-01-14T21:22:46.595ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 77 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
16452026-01-14T21:22:46.595ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 60 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
16462026-01-14T21:22:46.595ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 109 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
16472026-01-14T21:22:46.603ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
16482026-01-14T21:22:46.603ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 78 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
16492026-01-14T21:22:46.603ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 110 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
16502026-01-14T21:22:46.604ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
16512026-01-14T21:22:46.604ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
16522026-01-14T21:22:46.604ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
16532026-01-14T21:22:46.604ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
16542026-01-14T21:22:46.604ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 83 } interface = fake-sled1 response = CabooseValue
16552026-01-14T21:22:46.604ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 84 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
16562026-01-14T21:22:46.604ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
16572026-01-14T21:22:46.604ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
16582026-01-14T21:22:46.604ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 78 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
16592026-01-14T21:22:46.604ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 110 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
16602026-01-14T21:22:46.606ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 79 }, kind: MgsRequest(SpState) }
16612026-01-14T21:22:46.606ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 111 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
16622026-01-14T21:22:46.606ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
16632026-01-14T21:22:46.606ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
16642026-01-14T21:22:46.606ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
16652026-01-14T21:22:46.606ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 84 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
16662026-01-14T21:22:46.606ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 85 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
16672026-01-14T21:22:46.607ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 79 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
16682026-01-14T21:22:46.608ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 111 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
16692026-01-14T21:22:46.608ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
16702026-01-14T21:22:46.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 112 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
16712026-01-14T21:22:46.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
16722026-01-14T21:22:46.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
16732026-01-14T21:22:46.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
16742026-01-14T21:22:46.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
16752026-01-14T21:22:46.609ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
16762026-01-14T21:22:46.609ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 85 } interface = fake-sled1 response = CabooseValue
16772026-01-14T21:22:46.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 86 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
16782026-01-14T21:22:46.610ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
16792026-01-14T21:22:46.610ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
16802026-01-14T21:22:46.610ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 112 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
16812026-01-14T21:22:46.612ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 113 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
16822026-01-14T21:22:46.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
16832026-01-14T21:22:46.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
16842026-01-14T21:22:46.612ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 86 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
16852026-01-14T21:22:46.612ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 87 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
16862026-01-14T21:22:46.614ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 113 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
16872026-01-14T21:22:46.614ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 114 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
16882026-01-14T21:22:46.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
16892026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
16902026-01-14T21:22:46.615ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 87 } interface = fake-sled1 response = CabooseValue
16912026-01-14T21:22:46.615ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 88 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
16922026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
16932026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
16942026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
16952026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
16962026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
16972026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
16982026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
16992026-01-14T21:22:46.615ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 114 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
17002026-01-14T21:22:46.615ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 115 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
17012026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
17022026-01-14T21:22:46.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
17032026-01-14T21:22:46.615ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 88 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
17042026-01-14T21:22:46.616ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 89 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
17052026-01-14T21:22:46.621ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 115 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
17062026-01-14T21:22:46.628ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 116 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
17072026-01-14T21:22:46.628ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
17082026-01-14T21:22:46.628ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
17092026-01-14T21:22:46.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
17102026-01-14T21:22:46.643ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
17112026-01-14T21:22:46.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
17122026-01-14T21:22:46.650ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
17132026-01-14T21:22:46.650ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
17142026-01-14T21:22:46.650ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 89 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
17152026-01-14T21:22:46.650ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 90 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
17162026-01-14T21:22:46.656ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 63214 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 90534d2a-d5d9-410e-8b04-65591f7a3e0d response_code = 200 uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
17172026-01-14T21:22:46.658ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
17182026-01-14T21:22:46.659ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
17192026-01-14T21:22:46.659ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 116 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
17202026-01-14T21:22:46.665ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 117 }, kind: MgsRequest(SpState) }
17212026-01-14T21:22:46.666ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c21c9d1c-e655-41ff-b32b-10120ab54206 uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
17222026-01-14T21:22:46.667ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c21c9d1c-e655-41ff-b32b-10120ab54206 uri = /sp/sled/1/component/rot/caboose?firmware_slot=1 version = 3.0.0
17232026-01-14T21:22:46.668ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
17242026-01-14T21:22:46.669ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 90 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
17252026-01-14T21:22:46.671ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 91 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
17262026-01-14T21:22:46.673ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 117 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
17272026-01-14T21:22:46.674ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
17282026-01-14T21:22:46.681ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 91 } interface = fake-sled1 response = CabooseValue
17292026-01-14T21:22:46.681ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 92 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
17302026-01-14T21:22:46.683ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
17312026-01-14T21:22:46.683ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
17322026-01-14T21:22:46.683ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 92 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
17332026-01-14T21:22:46.684ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 93 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
17342026-01-14T21:22:46.685ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 93 } interface = fake-sled1 response = CabooseValue
17352026-01-14T21:22:46.685ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 94 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
17362026-01-14T21:22:46.686ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
17372026-01-14T21:22:46.686ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
17382026-01-14T21:22:46.686ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 94 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
17392026-01-14T21:22:46.686ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 95 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
17402026-01-14T21:22:46.687ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 95 } interface = fake-sled1 response = CabooseValue
17412026-01-14T21:22:46.687ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 96 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
17422026-01-14T21:22:46.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
17432026-01-14T21:22:46.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
17442026-01-14T21:22:46.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
17452026-01-14T21:22:46.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
17462026-01-14T21:22:46.687ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
17472026-01-14T21:22:46.687ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 96 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
17482026-01-14T21:22:46.687ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 97 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
17492026-01-14T21:22:46.690ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 97 } interface = fake-sled1 response = CabooseValue
17502026-01-14T21:22:46.690ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 98 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
17512026-01-14T21:22:46.690ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
17522026-01-14T21:22:46.690ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
17532026-01-14T21:22:46.690ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 98 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
17542026-01-14T21:22:46.690ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 99 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
17552026-01-14T21:22:46.691ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 99 } interface = fake-sled1 response = CabooseValue
17562026-01-14T21:22:46.691ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 100 }, kind: MgsRequest(SpState) }
17572026-01-14T21:22:46.691ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
17582026-01-14T21:22:46.691ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 100 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
17592026-01-14T21:22:46.691ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 101 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
17602026-01-14T21:22:46.691ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
17612026-01-14T21:22:46.692ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 101 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
17622026-01-14T21:22:46.692ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 25402 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = c21c9d1c-e655-41ff-b32b-10120ab54206 response_code = 200 uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
17632026-01-14T21:22:46.693ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 75f146a6-bbf0-47b3-a3f9-32fbac549b1e uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
17642026-01-14T21:22:46.693ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 75f146a6-bbf0-47b3-a3f9-32fbac549b1e uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0 version = 3.0.0
17652026-01-14T21:22:46.693ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 102 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
17662026-01-14T21:22:46.693ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 102 } interface = fake-sled1 response = CabooseValue
17672026-01-14T21:22:46.693ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 103 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
17682026-01-14T21:22:46.694ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 103 } interface = fake-sled1 response = CabooseValue
17692026-01-14T21:22:46.694ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 104 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
17702026-01-14T21:22:46.694ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 104 } interface = fake-sled1 response = CabooseValue
17712026-01-14T21:22:46.694ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 105 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
17722026-01-14T21:22:46.694ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 105 } interface = fake-sled1 response = CabooseValue
17732026-01-14T21:22:46.694ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 106 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
17742026-01-14T21:22:46.695ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 106 } interface = fake-sled1 response = CabooseValue
17752026-01-14T21:22:46.695ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 107 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
17762026-01-14T21:22:46.695ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 107 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
17772026-01-14T21:22:46.695ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1997 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 75f146a6-bbf0-47b3-a3f9-32fbac549b1e response_code = 200 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
17782026-01-14T21:22:46.696ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 26a34c36-efec-4007-890e-bc5d6fb60d07 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
17792026-01-14T21:22:46.696ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 26a34c36-efec-4007-890e-bc5d6fb60d07 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1 version = 3.0.0
17802026-01-14T21:22:46.696ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 108 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
17812026-01-14T21:22:46.696ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 108 } interface = fake-sled1 response = CabooseValue
17822026-01-14T21:22:46.696ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 109 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
17832026-01-14T21:22:46.696ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 109 } interface = fake-sled1 response = CabooseValue
17842026-01-14T21:22:46.697ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 110 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
17852026-01-14T21:22:46.697ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 110 } interface = fake-sled1 response = CabooseValue
17862026-01-14T21:22:46.697ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 111 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
17872026-01-14T21:22:46.697ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 111 } interface = fake-sled1 response = CabooseValue
17882026-01-14T21:22:46.697ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 112 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
17892026-01-14T21:22:46.697ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 112 } interface = fake-sled1 response = CabooseValue
17902026-01-14T21:22:46.697ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 113 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
17912026-01-14T21:22:46.697ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 113 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
17922026-01-14T21:22:46.698ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1728 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 26a34c36-efec-4007-890e-bc5d6fb60d07 response_code = 200 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
17932026-01-14T21:22:46.698ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 0a18bf5e-283e-4b36-909c-0c3c0ced79d1 uri = /sp/sled/1/component/rot/cmpa
17942026-01-14T21:22:46.698ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 0a18bf5e-283e-4b36-909c-0c3c0ced79d1 uri = /sp/sled/1/component/rot/cmpa version = 3.0.0
17952026-01-14T21:22:46.699ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 114 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
17962026-01-14T21:22:46.699ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 114 } interface = fake-sled1 response = ReadRot(Ok)
17972026-01-14T21:22:46.699ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 627 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 0a18bf5e-283e-4b36-909c-0c3c0ced79d1 response_code = 200 uri = /sp/sled/1/component/rot/cmpa
17982026-01-14T21:22:46.700ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fbf767b6-a9ff-4409-bf09-c9bd9ac460a7 uri = /sp/sled/1/component/rot/cfpa
17992026-01-14T21:22:46.700ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fbf767b6-a9ff-4409-bf09-c9bd9ac460a7 uri = /sp/sled/1/component/rot/cfpa version = 3.0.0
18002026-01-14T21:22:46.700ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 115 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
18012026-01-14T21:22:46.700ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 115 } interface = fake-sled1 response = ReadRot(Ok)
18022026-01-14T21:22:46.701ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 748 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = fbf767b6-a9ff-4409-bf09-c9bd9ac460a7 response_code = 200 uri = /sp/sled/1/component/rot/cfpa
18032026-01-14T21:22:46.701ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 6e7d76b3-5844-4bea-b59b-dde7bcf78e19 uri = /sp/sled/1/component/rot/cfpa
18042026-01-14T21:22:46.702ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 6e7d76b3-5844-4bea-b59b-dde7bcf78e19 uri = /sp/sled/1/component/rot/cfpa version = 3.0.0
18052026-01-14T21:22:46.702ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 116 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
18062026-01-14T21:22:46.702ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 116 } interface = fake-sled1 response = ReadRot(Ok)
18072026-01-14T21:22:46.702ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1130 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 6e7d76b3-5844-4bea-b59b-dde7bcf78e19 response_code = 200 uri = /sp/sled/1/component/rot/cfpa
18082026-01-14T21:22:46.707ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 35ce774c-51eb-4812-8e25-fd1c255238a2 uri = /sp/sled/1/component/rot/cfpa
18092026-01-14T21:22:46.707ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 35ce774c-51eb-4812-8e25-fd1c255238a2 uri = /sp/sled/1/component/rot/cfpa version = 3.0.0
18102026-01-14T21:22:46.707ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 117 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
18112026-01-14T21:22:46.707ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 117 } interface = fake-sled1 response = ReadRot(Ok)
18122026-01-14T21:22:46.707ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 543 local_addr = [::1]:59250 method = GET remote_addr = [::1]:62232 req_id = 35ce774c-51eb-4812-8e25-fd1c255238a2 response_code = 200 uri = /sp/sled/1/component/rot/cfpa
18132026-01-14T21:22:47.594ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
18142026-01-14T21:22:47.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
18152026-01-14T21:22:47.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
18162026-01-14T21:22:47.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
18172026-01-14T21:22:47.595ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 61 }, kind: MgsRequest(SpState) }
18182026-01-14T21:22:47.595ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 80 }, kind: MgsRequest(SpState) }
18192026-01-14T21:22:47.602ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 118 }, kind: MgsRequest(SpState) }
18202026-01-14T21:22:47.602ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 118 }, kind: MgsRequest(SpState) }
18212026-01-14T21:22:47.602ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
18222026-01-14T21:22:47.602ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
18232026-01-14T21:22:47.602ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
18242026-01-14T21:22:47.602ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
18252026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 80 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
18262026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 61 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
18272026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 118 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
18282026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 118 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
18292026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 81 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
18302026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 62 }, kind: MgsRequest(SpState) }
18312026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 119 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
18322026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 119 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
18332026-01-14T21:22:47.603ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
18342026-01-14T21:22:47.603ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
18352026-01-14T21:22:47.603ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
18362026-01-14T21:22:47.603ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
18372026-01-14T21:22:47.603ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
18382026-01-14T21:22:47.603ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
18392026-01-14T21:22:47.603ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
18402026-01-14T21:22:47.603ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 81 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18412026-01-14T21:22:47.604ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 62 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
18422026-01-14T21:22:47.604ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 119 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18432026-01-14T21:22:47.604ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 119 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18442026-01-14T21:22:47.605ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
18452026-01-14T21:22:47.607ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 82 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
18462026-01-14T21:22:47.607ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 120 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
18472026-01-14T21:22:47.607ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 120 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
18482026-01-14T21:22:47.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
18492026-01-14T21:22:47.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
18502026-01-14T21:22:47.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
18512026-01-14T21:22:47.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
18522026-01-14T21:22:47.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
18532026-01-14T21:22:47.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
18542026-01-14T21:22:47.608ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 82 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18552026-01-14T21:22:47.608ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 120 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18562026-01-14T21:22:47.608ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 120 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18572026-01-14T21:22:47.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 83 }, kind: MgsRequest(SpState) }
18582026-01-14T21:22:47.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 121 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
18592026-01-14T21:22:47.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 121 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
18602026-01-14T21:22:47.613ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
18612026-01-14T21:22:47.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
18622026-01-14T21:22:47.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
18632026-01-14T21:22:47.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
18642026-01-14T21:22:47.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
18652026-01-14T21:22:47.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
18662026-01-14T21:22:47.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
18672026-01-14T21:22:47.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
18682026-01-14T21:22:47.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
18692026-01-14T21:22:47.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
18702026-01-14T21:22:47.614ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 83 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
18712026-01-14T21:22:47.614ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 121 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18722026-01-14T21:22:47.614ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 121 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
18732026-01-14T21:22:47.614ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
18742026-01-14T21:22:47.621ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 122 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
18752026-01-14T21:22:47.622ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 122 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
18762026-01-14T21:22:47.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
18772026-01-14T21:22:47.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
18782026-01-14T21:22:47.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
18792026-01-14T21:22:47.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
18802026-01-14T21:22:47.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
18812026-01-14T21:22:47.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
18822026-01-14T21:22:47.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
18832026-01-14T21:22:47.622ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 122 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
18842026-01-14T21:22:47.622ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 122 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18852026-01-14T21:22:47.626ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 123 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
18862026-01-14T21:22:47.626ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 123 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
18872026-01-14T21:22:47.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
18882026-01-14T21:22:47.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
18892026-01-14T21:22:47.628ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
18902026-01-14T21:22:47.628ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
18912026-01-14T21:22:47.629ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 123 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18922026-01-14T21:22:47.629ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 123 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
18932026-01-14T21:22:47.630ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 124 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
18942026-01-14T21:22:47.630ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 124 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
18952026-01-14T21:22:47.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
18962026-01-14T21:22:47.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
18972026-01-14T21:22:47.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
18982026-01-14T21:22:47.630ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
18992026-01-14T21:22:47.631ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 124 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19002026-01-14T21:22:47.631ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 124 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19012026-01-14T21:22:47.632ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 125 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
19022026-01-14T21:22:47.633ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 125 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
19032026-01-14T21:22:47.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
19042026-01-14T21:22:47.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
19052026-01-14T21:22:47.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
19062026-01-14T21:22:47.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
19072026-01-14T21:22:47.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
19082026-01-14T21:22:47.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
19092026-01-14T21:22:47.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
19102026-01-14T21:22:47.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 125 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19112026-01-14T21:22:47.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 125 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
19122026-01-14T21:22:47.640ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 126 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
19132026-01-14T21:22:47.640ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 126 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
19142026-01-14T21:22:47.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
19152026-01-14T21:22:47.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
19162026-01-14T21:22:47.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
19172026-01-14T21:22:47.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
19182026-01-14T21:22:47.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
19192026-01-14T21:22:47.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
19202026-01-14T21:22:47.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
19212026-01-14T21:22:47.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
19222026-01-14T21:22:47.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
19232026-01-14T21:22:47.645ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 126 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
19242026-01-14T21:22:47.645ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 126 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19252026-01-14T21:22:47.652ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 127 }, kind: MgsRequest(SpState) }
19262026-01-14T21:22:47.656ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 127 }, kind: MgsRequest(SpState) }
19272026-01-14T21:22:47.662ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
19282026-01-14T21:22:47.662ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
19292026-01-14T21:22:47.670ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 127 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
19302026-01-14T21:22:47.671ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 127 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
19312026-01-14T21:22:47.675ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
19322026-01-14T21:22:47.675ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
19332026-01-14T21:22:48.577ZTRACtest_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
19342026-01-14T21:22:48.581ZWARNtest_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry count = 5 delay = 11.017453809s error = "proto error: io error: No route to host (os error 148)" file = oximeter/producer/src/lib.rs:371
19352026-01-14T21:22:48.598ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
19362026-01-14T21:22:48.598ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
19372026-01-14T21:22:48.598ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
19382026-01-14T21:22:48.598ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
19392026-01-14T21:22:48.598ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 63 }, kind: MgsRequest(SpState) }
19402026-01-14T21:22:48.598ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 84 }, kind: MgsRequest(SpState) }
19412026-01-14T21:22:48.598ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 128 }, kind: MgsRequest(SpState) }
19422026-01-14T21:22:48.598ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 128 }, kind: MgsRequest(SpState) }
19432026-01-14T21:22:48.599ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
19442026-01-14T21:22:48.599ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
19452026-01-14T21:22:48.599ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
19462026-01-14T21:22:48.599ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
19472026-01-14T21:22:48.599ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 84 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
19482026-01-14T21:22:48.600ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 63 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
19492026-01-14T21:22:48.600ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 128 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
19502026-01-14T21:22:48.600ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 128 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
19512026-01-14T21:22:48.602ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 85 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
19522026-01-14T21:22:48.602ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 64 }, kind: MgsRequest(SpState) }
19532026-01-14T21:22:48.602ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 129 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
19542026-01-14T21:22:48.602ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 129 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
19552026-01-14T21:22:48.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
19562026-01-14T21:22:48.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
19572026-01-14T21:22:48.612ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
19582026-01-14T21:22:48.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
19592026-01-14T21:22:48.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
19602026-01-14T21:22:48.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
19612026-01-14T21:22:48.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
19622026-01-14T21:22:48.612ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 85 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19632026-01-14T21:22:48.613ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 64 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
19642026-01-14T21:22:48.613ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 129 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19652026-01-14T21:22:48.613ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 129 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19662026-01-14T21:22:48.614ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
19672026-01-14T21:22:48.617ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 86 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
19682026-01-14T21:22:48.617ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 130 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
19692026-01-14T21:22:48.617ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 130 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
19702026-01-14T21:22:48.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
19712026-01-14T21:22:48.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
19722026-01-14T21:22:48.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
19732026-01-14T21:22:48.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
19742026-01-14T21:22:48.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
19752026-01-14T21:22:48.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
19762026-01-14T21:22:48.624ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 86 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19772026-01-14T21:22:48.624ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 130 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19782026-01-14T21:22:48.625ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 130 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19792026-01-14T21:22:48.631ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 87 }, kind: MgsRequest(SpState) }
19802026-01-14T21:22:48.631ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 131 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
19812026-01-14T21:22:48.631ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 131 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
19822026-01-14T21:22:48.631ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
19832026-01-14T21:22:48.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
19842026-01-14T21:22:48.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
19852026-01-14T21:22:48.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
19862026-01-14T21:22:48.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
19872026-01-14T21:22:48.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
19882026-01-14T21:22:48.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
19892026-01-14T21:22:48.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
19902026-01-14T21:22:48.631ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
19912026-01-14T21:22:48.632ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
19922026-01-14T21:22:48.632ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 87 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
19932026-01-14T21:22:48.632ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 131 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
19942026-01-14T21:22:48.632ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 131 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
19952026-01-14T21:22:48.632ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
19962026-01-14T21:22:48.637ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 132 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
19972026-01-14T21:22:48.637ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 132 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
19982026-01-14T21:22:48.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
19992026-01-14T21:22:48.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
20002026-01-14T21:22:48.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
20012026-01-14T21:22:48.637ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
20022026-01-14T21:22:48.638ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
20032026-01-14T21:22:48.638ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
20042026-01-14T21:22:48.638ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
20052026-01-14T21:22:48.638ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 132 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
20062026-01-14T21:22:48.638ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 132 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
20072026-01-14T21:22:48.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 133 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
20082026-01-14T21:22:48.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 133 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
20092026-01-14T21:22:48.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
20102026-01-14T21:22:48.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
20112026-01-14T21:22:48.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
20122026-01-14T21:22:48.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
20132026-01-14T21:22:48.642ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 133 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
20142026-01-14T21:22:48.642ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 133 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
20152026-01-14T21:22:48.644ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 134 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
20162026-01-14T21:22:48.644ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 134 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
20172026-01-14T21:22:48.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
20182026-01-14T21:22:48.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
20192026-01-14T21:22:48.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
20202026-01-14T21:22:48.645ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
20212026-01-14T21:22:48.645ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 134 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
20222026-01-14T21:22:48.645ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 134 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
20232026-01-14T21:22:48.649ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 135 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
20242026-01-14T21:22:48.649ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 135 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
20252026-01-14T21:22:48.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
20262026-01-14T21:22:48.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
20272026-01-14T21:22:48.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
20282026-01-14T21:22:48.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
20292026-01-14T21:22:48.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
20302026-01-14T21:22:48.649ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
20312026-01-14T21:22:48.650ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
20322026-01-14T21:22:48.650ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 135 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
20332026-01-14T21:22:48.650ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 135 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
20342026-01-14T21:22:48.654ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 136 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
20352026-01-14T21:22:48.654ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 136 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
20362026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
20372026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
20382026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
20392026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
20402026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
20412026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
20422026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
20432026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
20442026-01-14T21:22:48.654ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
20452026-01-14T21:22:48.654ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 136 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
20462026-01-14T21:22:48.655ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 136 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
20472026-01-14T21:22:48.660ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 137 }, kind: MgsRequest(SpState) }
20482026-01-14T21:22:48.660ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 137 }, kind: MgsRequest(SpState) }
20492026-01-14T21:22:48.661ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
20502026-01-14T21:22:48.661ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
20512026-01-14T21:22:48.661ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 137 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
20522026-01-14T21:22:48.661ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 137 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
20532026-01-14T21:22:48.661ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
20542026-01-14T21:22:48.661ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
20552026-01-14T21:22:49.440ZINFOtest_vpc_firewall (dropshot): accepted connection local_addr = [::1]:59250 remote_addr = [::1]:46538
20562026-01-14T21:22:49.585ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 84a06048-19f8-48e8-befa-509f2d9d1b4f uri = /ignition
20572026-01-14T21:22:49.585ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 84a06048-19f8-48e8-befa-509f2d9d1b4f uri = /ignition version = 3.0.0
20582026-01-14T21:22:49.586ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 88 }, kind: MgsRequest(BulkIgnitionState { offset: 0 }) }
20592026-01-14T21:22:49.591ZDEBGtest_vpc_firewall: received bulk ignition state request offset = 0 slot = sidecar 0 state = [IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Sidecar, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Sidecar, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Gimlet, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, target: Some(TargetState { system_type: Gimlet, power_state: On, power_reset_in_progress: false, faults: SystemFaults { power_a3: false, power_a2: false, sp: false, rot: false }, controller0_present: true, controller1_present: false, link0_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false }, link1_receiver_status: ReceiverStatus { aligned: true, locked: true, polarity_inverted: false } }) }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }, IgnitionState { receiver: ReceiverStatus { aligned: false, locked: false, polarity_inverted: false }, target: None }]
20602026-01-14T21:22:49.595ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 88 } interface = fake-switch0 response = BulkIgnitionState(TlvPage { offset: 0, total: 35 })
20612026-01-14T21:22:49.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
20622026-01-14T21:22:49.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
20632026-01-14T21:22:49.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
20642026-01-14T21:22:49.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
20652026-01-14T21:22:49.595ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 4 returned by ignition controller SP
20662026-01-14T21:22:49.595ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 5 returned by ignition controller SP
20672026-01-14T21:22:49.595ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 6 returned by ignition controller SP
20682026-01-14T21:22:49.595ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 7 returned by ignition controller SP
20692026-01-14T21:22:49.595ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 8 returned by ignition controller SP
20702026-01-14T21:22:49.595ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 9 returned by ignition controller SP
20712026-01-14T21:22:49.595ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 10 returned by ignition controller SP
20722026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 11 returned by ignition controller SP
20732026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 12 returned by ignition controller SP
20742026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 13 returned by ignition controller SP
20752026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 14 returned by ignition controller SP
20762026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 15 returned by ignition controller SP
20772026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 16 returned by ignition controller SP
20782026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 17 returned by ignition controller SP
20792026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 18 returned by ignition controller SP
20802026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 19 returned by ignition controller SP
20812026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 20 returned by ignition controller SP
20822026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 21 returned by ignition controller SP
20832026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 22 returned by ignition controller SP
20842026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 23 returned by ignition controller SP
20852026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 24 returned by ignition controller SP
20862026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 25 returned by ignition controller SP
20872026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 26 returned by ignition controller SP
20882026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 27 returned by ignition controller SP
20892026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 28 returned by ignition controller SP
20902026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 29 returned by ignition controller SP
20912026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 30 returned by ignition controller SP
20922026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 31 returned by ignition controller SP
20932026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 32 returned by ignition controller SP
20942026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 33 returned by ignition controller SP
20952026-01-14T21:22:49.596ZWARNtest_vpc_firewall (ManagementSwitch): ignoring unknown ignition target 34 returned by ignition controller SP
20962026-01-14T21:22:49.598ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 65 }, kind: MgsRequest(SpState) }
20972026-01-14T21:22:49.598ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 89 }, kind: MgsRequest(SpState) }
20982026-01-14T21:22:49.598ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 138 }, kind: MgsRequest(SpState) }
20992026-01-14T21:22:49.598ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 138 }, kind: MgsRequest(SpState) }
21002026-01-14T21:22:49.598ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 13209 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 84a06048-19f8-48e8-befa-509f2d9d1b4f response_code = 200 uri = /ignition
21012026-01-14T21:22:49.603ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
21022026-01-14T21:22:49.603ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
21032026-01-14T21:22:49.603ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
21042026-01-14T21:22:49.603ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
21052026-01-14T21:22:49.605ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 89 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
21062026-01-14T21:22:49.605ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 65 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
21072026-01-14T21:22:49.605ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 138 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
21082026-01-14T21:22:49.606ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 138 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
21092026-01-14T21:22:49.606ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 0f52412a-e5c7-460a-ad1d-6e6a3483bb35 uri = /sp/switch/0
21102026-01-14T21:22:49.606ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 0f52412a-e5c7-460a-ad1d-6e6a3483bb35 uri = /sp/switch/0 version = 3.0.0
21112026-01-14T21:22:49.607ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 90 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
21122026-01-14T21:22:49.607ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 66 }, kind: MgsRequest(SpState) }
21132026-01-14T21:22:49.608ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 139 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
21142026-01-14T21:22:49.608ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 139 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
21152026-01-14T21:22:49.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
21162026-01-14T21:22:49.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
21172026-01-14T21:22:49.608ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
21182026-01-14T21:22:49.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
21192026-01-14T21:22:49.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
21202026-01-14T21:22:49.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
21212026-01-14T21:22:49.608ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
21222026-01-14T21:22:49.608ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 90 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21232026-01-14T21:22:49.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 91 }, kind: MgsRequest(SpState) }
21242026-01-14T21:22:49.609ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 66 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
21252026-01-14T21:22:49.609ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 139 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21262026-01-14T21:22:49.609ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 139 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21272026-01-14T21:22:49.610ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
21282026-01-14T21:22:49.613ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 140 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
21292026-01-14T21:22:49.613ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 140 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
21302026-01-14T21:22:49.613ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
21312026-01-14T21:22:49.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
21322026-01-14T21:22:49.617ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
21332026-01-14T21:22:49.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
21342026-01-14T21:22:49.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
21352026-01-14T21:22:49.619ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 91 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
21362026-01-14T21:22:49.619ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 92 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
21372026-01-14T21:22:49.619ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 140 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21382026-01-14T21:22:49.619ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 140 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21392026-01-14T21:22:49.622ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 141 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
21402026-01-14T21:22:49.622ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 141 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
21412026-01-14T21:22:49.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
21422026-01-14T21:22:49.622ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
21432026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
21442026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
21452026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
21462026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
21472026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
21482026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
21492026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
21502026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
21512026-01-14T21:22:49.623ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
21522026-01-14T21:22:49.624ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 92 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21532026-01-14T21:22:49.624ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 93 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
21542026-01-14T21:22:49.624ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 141 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21552026-01-14T21:22:49.624ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 141 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
21562026-01-14T21:22:49.635ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 142 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
21572026-01-14T21:22:49.635ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 142 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
21582026-01-14T21:22:49.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
21592026-01-14T21:22:49.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
21602026-01-14T21:22:49.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
21612026-01-14T21:22:49.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
21622026-01-14T21:22:49.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
21632026-01-14T21:22:49.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
21642026-01-14T21:22:49.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
21652026-01-14T21:22:49.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 93 } interface = fake-switch0 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
21662026-01-14T21:22:49.637ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 94 }, kind: MgsRequest(SpState) }
21672026-01-14T21:22:49.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 142 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
21682026-01-14T21:22:49.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 142 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21692026-01-14T21:22:49.642ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 36254 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 0f52412a-e5c7-460a-ad1d-6e6a3483bb35 response_code = 200 uri = /sp/switch/0
21702026-01-14T21:22:49.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 143 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
21712026-01-14T21:22:49.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 143 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
21722026-01-14T21:22:49.652ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
21732026-01-14T21:22:49.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
21742026-01-14T21:22:49.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
21752026-01-14T21:22:49.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
21762026-01-14T21:22:49.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
21772026-01-14T21:22:49.654ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 94 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
21782026-01-14T21:22:49.654ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 143 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21792026-01-14T21:22:49.654ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 143 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21802026-01-14T21:22:49.654ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6c998af3-7407-4335-86c6-cdc249858d2a uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
21812026-01-14T21:22:49.654ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6c998af3-7407-4335-86c6-cdc249858d2a uri = /sp/switch/0/component/sp/caboose?firmware_slot=0 version = 3.0.0
21822026-01-14T21:22:49.654ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
21832026-01-14T21:22:49.664ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 144 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
21842026-01-14T21:22:49.664ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 144 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
21852026-01-14T21:22:49.665ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 95 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
21862026-01-14T21:22:49.666ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
21872026-01-14T21:22:49.666ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
21882026-01-14T21:22:49.666ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
21892026-01-14T21:22:49.666ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
21902026-01-14T21:22:49.666ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 95 } interface = fake-switch0 response = CabooseValue
21912026-01-14T21:22:49.667ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 144 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21922026-01-14T21:22:49.667ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 144 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
21932026-01-14T21:22:49.669ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 96 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
21942026-01-14T21:22:49.669ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 145 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
21952026-01-14T21:22:49.669ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 145 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
21962026-01-14T21:22:49.674ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
21972026-01-14T21:22:49.674ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
21982026-01-14T21:22:49.674ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
21992026-01-14T21:22:49.674ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
22002026-01-14T21:22:49.674ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
22012026-01-14T21:22:49.674ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
22022026-01-14T21:22:49.674ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
22032026-01-14T21:22:49.675ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 96 } interface = fake-switch0 response = CabooseValue
22042026-01-14T21:22:49.675ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 145 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
22052026-01-14T21:22:49.675ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 145 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
22062026-01-14T21:22:49.678ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 97 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
22072026-01-14T21:22:49.679ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 146 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
22082026-01-14T21:22:49.679ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 146 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
22092026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
22102026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
22112026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
22122026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
22132026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
22142026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
22152026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
22162026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
22172026-01-14T21:22:49.679ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
22182026-01-14T21:22:49.679ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 97 } interface = fake-switch0 response = CabooseValue
22192026-01-14T21:22:49.679ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 146 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
22202026-01-14T21:22:49.679ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 146 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
22212026-01-14T21:22:49.687ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 98 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
22222026-01-14T21:22:49.687ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 147 }, kind: MgsRequest(SpState) }
22232026-01-14T21:22:49.687ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 147 }, kind: MgsRequest(SpState) }
22242026-01-14T21:22:49.767ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
22252026-01-14T21:22:49.768ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
22262026-01-14T21:22:49.770ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 98 } interface = fake-switch0 response = CabooseValue
22272026-01-14T21:22:49.770ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 147 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
22282026-01-14T21:22:49.771ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 147 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
22292026-01-14T21:22:49.771ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
22302026-01-14T21:22:49.771ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
22312026-01-14T21:22:49.771ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 99 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
22322026-01-14T21:22:49.772ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 99 } interface = fake-switch0 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
22332026-01-14T21:22:49.772ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 100 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
22342026-01-14T21:22:49.773ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 100 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
22352026-01-14T21:22:49.773ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 118918 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6c998af3-7407-4335-86c6-cdc249858d2a response_code = 200 uri = /sp/switch/0/component/sp/caboose?firmware_slot=0
22362026-01-14T21:22:49.774ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = bb5a15ee-3e32-44d6-9d3c-7a8e428c128a uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
22372026-01-14T21:22:49.774ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = bb5a15ee-3e32-44d6-9d3c-7a8e428c128a uri = /sp/switch/0/component/sp/caboose?firmware_slot=1 version = 3.0.0
22382026-01-14T21:22:49.775ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 101 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
22392026-01-14T21:22:49.781ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 101 } interface = fake-switch0 response = CabooseValue
22402026-01-14T21:22:49.781ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 102 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
22412026-01-14T21:22:49.782ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 102 } interface = fake-switch0 response = CabooseValue
22422026-01-14T21:22:49.782ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 103 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
22432026-01-14T21:22:49.782ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 103 } interface = fake-switch0 response = CabooseValue
22442026-01-14T21:22:49.782ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 104 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
22452026-01-14T21:22:49.782ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 104 } interface = fake-switch0 response = CabooseValue
22462026-01-14T21:22:49.783ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 105 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
22472026-01-14T21:22:49.783ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 105 } interface = fake-switch0 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
22482026-01-14T21:22:49.783ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 106 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
22492026-01-14T21:22:49.783ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 106 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
22502026-01-14T21:22:49.783ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 9214 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = bb5a15ee-3e32-44d6-9d3c-7a8e428c128a response_code = 200 uri = /sp/switch/0/component/sp/caboose?firmware_slot=1
22512026-01-14T21:22:49.787ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ed91135a-0847-4aba-b698-8582fb55c044 uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
22522026-01-14T21:22:49.787ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ed91135a-0847-4aba-b698-8582fb55c044 uri = /sp/switch/0/component/rot/caboose?firmware_slot=0 version = 3.0.0
22532026-01-14T21:22:49.787ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 107 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
22542026-01-14T21:22:49.787ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 107 } interface = fake-switch0 response = CabooseValue
22552026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 108 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
22562026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 108 } interface = fake-switch0 response = CabooseValue
22572026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 109 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
22582026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 109 } interface = fake-switch0 response = CabooseValue
22592026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 110 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
22602026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 110 } interface = fake-switch0 response = CabooseValue
22612026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 111 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
22622026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 111 } interface = fake-switch0 response = CabooseValue
22632026-01-14T21:22:49.788ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 112 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
22642026-01-14T21:22:49.789ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 112 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
22652026-01-14T21:22:49.789ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1897 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ed91135a-0847-4aba-b698-8582fb55c044 response_code = 200 uri = /sp/switch/0/component/rot/caboose?firmware_slot=0
22662026-01-14T21:22:49.792ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = f9cef0a8-1a5a-45e7-bf70-e400afbe66d0 uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
22672026-01-14T21:22:49.792ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = f9cef0a8-1a5a-45e7-bf70-e400afbe66d0 uri = /sp/switch/0/component/rot/caboose?firmware_slot=1 version = 3.0.0
22682026-01-14T21:22:49.792ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 113 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
22692026-01-14T21:22:49.792ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 113 } interface = fake-switch0 response = CabooseValue
22702026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 114 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
22712026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 114 } interface = fake-switch0 response = CabooseValue
22722026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 115 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
22732026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 115 } interface = fake-switch0 response = CabooseValue
22742026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 116 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
22752026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 116 } interface = fake-switch0 response = CabooseValue
22762026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 117 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
22772026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 117 } interface = fake-switch0 response = CabooseValue
22782026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 118 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
22792026-01-14T21:22:49.793ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 118 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
22802026-01-14T21:22:49.794ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1896 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = f9cef0a8-1a5a-45e7-bf70-e400afbe66d0 response_code = 200 uri = /sp/switch/0/component/rot/caboose?firmware_slot=1
22812026-01-14T21:22:49.795ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 38d91f3c-426b-4423-bc63-4d9b7a932f01 uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
22822026-01-14T21:22:49.795ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 38d91f3c-426b-4423-bc63-4d9b7a932f01 uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0 version = 3.0.0
22832026-01-14T21:22:49.795ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 119 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
22842026-01-14T21:22:49.796ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 119 } interface = fake-switch0 response = CabooseValue
22852026-01-14T21:22:49.796ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 120 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
22862026-01-14T21:22:49.796ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 120 } interface = fake-switch0 response = CabooseValue
22872026-01-14T21:22:49.796ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 121 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
22882026-01-14T21:22:49.796ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 121 } interface = fake-switch0 response = CabooseValue
22892026-01-14T21:22:49.796ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 122 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
22902026-01-14T21:22:49.797ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 122 } interface = fake-switch0 response = CabooseValue
22912026-01-14T21:22:49.797ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 123 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
22922026-01-14T21:22:49.797ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 123 } interface = fake-switch0 response = CabooseValue
22932026-01-14T21:22:49.797ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 124 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
22942026-01-14T21:22:49.797ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 124 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
22952026-01-14T21:22:49.797ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2324 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 38d91f3c-426b-4423-bc63-4d9b7a932f01 response_code = 200 uri = /sp/switch/0/component/stage0/caboose?firmware_slot=0
22962026-01-14T21:22:49.798ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 48474332-c15b-40e4-8851-c0e74c13d6b9 uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
22972026-01-14T21:22:49.798ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 48474332-c15b-40e4-8851-c0e74c13d6b9 uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1 version = 3.0.0
22982026-01-14T21:22:49.799ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 125 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
22992026-01-14T21:22:49.799ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 125 } interface = fake-switch0 response = CabooseValue
23002026-01-14T21:22:49.799ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 126 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
23012026-01-14T21:22:49.799ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 126 } interface = fake-switch0 response = CabooseValue
23022026-01-14T21:22:49.799ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 127 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
23032026-01-14T21:22:49.799ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 127 } interface = fake-switch0 response = CabooseValue
23042026-01-14T21:22:49.799ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 128 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
23052026-01-14T21:22:49.800ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 128 } interface = fake-switch0 response = CabooseValue
23062026-01-14T21:22:49.800ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 129 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
23072026-01-14T21:22:49.800ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 129 } interface = fake-switch0 response = CabooseValue
23082026-01-14T21:22:49.800ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 130 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
23092026-01-14T21:22:49.800ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 130 } interface = fake-switch0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
23102026-01-14T21:22:49.800ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1837 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 48474332-c15b-40e4-8851-c0e74c13d6b9 response_code = 200 uri = /sp/switch/0/component/stage0/caboose?firmware_slot=1
23112026-01-14T21:22:49.801ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ed75abaf-a6df-4fa0-8312-71b4e1a796b0 uri = /sp/switch/0/component/rot/cmpa
23122026-01-14T21:22:49.801ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ed75abaf-a6df-4fa0-8312-71b4e1a796b0 uri = /sp/switch/0/component/rot/cmpa version = 3.0.0
23132026-01-14T21:22:49.801ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 131 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
23142026-01-14T21:22:49.801ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 131 } interface = fake-switch0 response = ReadRot(Ok)
23152026-01-14T21:22:49.801ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 554 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ed75abaf-a6df-4fa0-8312-71b4e1a796b0 response_code = 200 uri = /sp/switch/0/component/rot/cmpa
23162026-01-14T21:22:49.802ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = b5e5f5bd-97ba-4e4a-bd30-6eb20c3df6f6 uri = /sp/switch/0/component/rot/cfpa
23172026-01-14T21:22:49.802ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = b5e5f5bd-97ba-4e4a-bd30-6eb20c3df6f6 uri = /sp/switch/0/component/rot/cfpa version = 3.0.0
23182026-01-14T21:22:49.803ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 132 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
23192026-01-14T21:22:49.803ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 132 } interface = fake-switch0 response = ReadRot(Ok)
23202026-01-14T21:22:49.803ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 643 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = b5e5f5bd-97ba-4e4a-bd30-6eb20c3df6f6 response_code = 200 uri = /sp/switch/0/component/rot/cfpa
23212026-01-14T21:22:49.804ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = f381509c-ed5d-49de-9d17-03c6fd4a4819 uri = /sp/switch/0/component/rot/cfpa
23222026-01-14T21:22:49.804ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = f381509c-ed5d-49de-9d17-03c6fd4a4819 uri = /sp/switch/0/component/rot/cfpa version = 3.0.0
23232026-01-14T21:22:49.804ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 133 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
23242026-01-14T21:22:49.804ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 133 } interface = fake-switch0 response = ReadRot(Ok)
23252026-01-14T21:22:49.804ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 594 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = f381509c-ed5d-49de-9d17-03c6fd4a4819 response_code = 200 uri = /sp/switch/0/component/rot/cfpa
23262026-01-14T21:22:49.813ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 1070a561-f83a-46e3-989a-b4625732b79d uri = /sp/switch/0/component/rot/cfpa
23272026-01-14T21:22:49.813ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 1070a561-f83a-46e3-989a-b4625732b79d uri = /sp/switch/0/component/rot/cfpa version = 3.0.0
23282026-01-14T21:22:49.814ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 134 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
23292026-01-14T21:22:49.814ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 134 } interface = fake-switch0 response = ReadRot(Ok)
23302026-01-14T21:22:49.814ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1102 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 1070a561-f83a-46e3-989a-b4625732b79d response_code = 200 uri = /sp/switch/0/component/rot/cfpa
23312026-01-14T21:22:49.815ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 97984b89-663f-4299-a690-909f800f2d77 uri = /sp/switch/1
23322026-01-14T21:22:49.815ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 97984b89-663f-4299-a690-909f800f2d77 uri = /sp/switch/1 version = 3.0.0
23332026-01-14T21:22:49.815ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 67 }, kind: MgsRequest(SpState) }
23342026-01-14T21:22:49.818ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
23352026-01-14T21:22:49.819ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 67 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
23362026-01-14T21:22:49.819ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 68 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
23372026-01-14T21:22:49.820ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 68 } interface = fake-switch1 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
23382026-01-14T21:22:49.820ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4546 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 97984b89-663f-4299-a690-909f800f2d77 response_code = 200 uri = /sp/switch/1
23392026-01-14T21:22:49.821ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 9ac9699c-8089-4e4c-b454-851c34a302e7 uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
23402026-01-14T21:22:49.821ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 9ac9699c-8089-4e4c-b454-851c34a302e7 uri = /sp/switch/1/component/sp/caboose?firmware_slot=0 version = 3.0.0
23412026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 69 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
23422026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 69 } interface = fake-switch1 response = CabooseValue
23432026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 70 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
23442026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 70 } interface = fake-switch1 response = CabooseValue
23452026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 71 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
23462026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 71 } interface = fake-switch1 response = CabooseValue
23472026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 72 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
23482026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 72 } interface = fake-switch1 response = CabooseValue
23492026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 73 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
23502026-01-14T21:22:49.822ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 73 } interface = fake-switch1 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
23512026-01-14T21:22:49.823ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 74 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
23522026-01-14T21:22:49.823ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 74 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
23532026-01-14T21:22:49.823ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1633 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 9ac9699c-8089-4e4c-b454-851c34a302e7 response_code = 200 uri = /sp/switch/1/component/sp/caboose?firmware_slot=0
23542026-01-14T21:22:49.824ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 75466c1d-4207-40e9-b773-6e90542fd9e7 uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
23552026-01-14T21:22:49.824ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 75466c1d-4207-40e9-b773-6e90542fd9e7 uri = /sp/switch/1/component/sp/caboose?firmware_slot=1 version = 3.0.0
23562026-01-14T21:22:49.824ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 75 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
23572026-01-14T21:22:49.824ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 75 } interface = fake-switch1 response = CabooseValue
23582026-01-14T21:22:49.824ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 76 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
23592026-01-14T21:22:49.826ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 76 } interface = fake-switch1 response = CabooseValue
23602026-01-14T21:22:49.826ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 77 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
23612026-01-14T21:22:49.827ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 77 } interface = fake-switch1 response = CabooseValue
23622026-01-14T21:22:49.827ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 78 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
23632026-01-14T21:22:49.827ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 78 } interface = fake-switch1 response = CabooseValue
23642026-01-14T21:22:49.827ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 79 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
23652026-01-14T21:22:49.827ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 79 } interface = fake-switch1 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
23662026-01-14T21:22:49.827ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 80 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
23672026-01-14T21:22:49.828ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 80 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
23682026-01-14T21:22:49.828ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4250 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 75466c1d-4207-40e9-b773-6e90542fd9e7 response_code = 200 uri = /sp/switch/1/component/sp/caboose?firmware_slot=1
23692026-01-14T21:22:49.833ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 56a54102-ac7e-49a5-93ed-5b5552b9a2bf uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
23702026-01-14T21:22:49.833ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 56a54102-ac7e-49a5-93ed-5b5552b9a2bf uri = /sp/switch/1/component/rot/caboose?firmware_slot=0 version = 3.0.0
23712026-01-14T21:22:49.836ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 81 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
23722026-01-14T21:22:49.836ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 81 } interface = fake-switch1 response = CabooseValue
23732026-01-14T21:22:49.836ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 82 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
23742026-01-14T21:22:49.836ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 82 } interface = fake-switch1 response = CabooseValue
23752026-01-14T21:22:49.836ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 83 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
23762026-01-14T21:22:49.836ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 83 } interface = fake-switch1 response = CabooseValue
23772026-01-14T21:22:49.836ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 84 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
23782026-01-14T21:22:49.837ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 84 } interface = fake-switch1 response = CabooseValue
23792026-01-14T21:22:49.837ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 85 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
23802026-01-14T21:22:49.837ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 85 } interface = fake-switch1 response = CabooseValue
23812026-01-14T21:22:49.837ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 86 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
23822026-01-14T21:22:49.837ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 86 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
23832026-01-14T21:22:49.837ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4865 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 56a54102-ac7e-49a5-93ed-5b5552b9a2bf response_code = 200 uri = /sp/switch/1/component/rot/caboose?firmware_slot=0
23842026-01-14T21:22:49.839ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6f836106-9bde-4823-9161-9e0fa2cfbf87 uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
23852026-01-14T21:22:49.840ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6f836106-9bde-4823-9161-9e0fa2cfbf87 uri = /sp/switch/1/component/rot/caboose?firmware_slot=1 version = 3.0.0
23862026-01-14T21:22:49.840ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 87 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
23872026-01-14T21:22:49.841ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 87 } interface = fake-switch1 response = CabooseValue
23882026-01-14T21:22:49.841ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 88 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
23892026-01-14T21:22:49.841ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 88 } interface = fake-switch1 response = CabooseValue
23902026-01-14T21:22:49.841ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 89 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
23912026-01-14T21:22:49.841ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 89 } interface = fake-switch1 response = CabooseValue
23922026-01-14T21:22:49.841ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 90 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
23932026-01-14T21:22:49.841ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 90 } interface = fake-switch1 response = CabooseValue
23942026-01-14T21:22:49.842ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 91 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
23952026-01-14T21:22:49.842ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 91 } interface = fake-switch1 response = CabooseValue
23962026-01-14T21:22:49.842ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 92 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
23972026-01-14T21:22:49.843ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 92 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
23982026-01-14T21:22:49.843ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4222 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6f836106-9bde-4823-9161-9e0fa2cfbf87 response_code = 200 uri = /sp/switch/1/component/rot/caboose?firmware_slot=1
23992026-01-14T21:22:49.860ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a39cfb47-8c47-47e5-86be-21ff1c533d2e uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
24002026-01-14T21:22:49.860ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a39cfb47-8c47-47e5-86be-21ff1c533d2e uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0 version = 3.0.0
24012026-01-14T21:22:49.861ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 93 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
24022026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 93 } interface = fake-switch1 response = CabooseValue
24032026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 94 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
24042026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 94 } interface = fake-switch1 response = CabooseValue
24052026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 95 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
24062026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 95 } interface = fake-switch1 response = CabooseValue
24072026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 96 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
24082026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 96 } interface = fake-switch1 response = CabooseValue
24092026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 97 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
24102026-01-14T21:22:49.862ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 97 } interface = fake-switch1 response = CabooseValue
24112026-01-14T21:22:49.863ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 98 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
24122026-01-14T21:22:49.863ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 98 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
24132026-01-14T21:22:49.863ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2777 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a39cfb47-8c47-47e5-86be-21ff1c533d2e response_code = 200 uri = /sp/switch/1/component/stage0/caboose?firmware_slot=0
24142026-01-14T21:22:49.864ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 23ed68ef-333b-4853-86f0-85ca8a39bdd7 uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
24152026-01-14T21:22:49.864ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 23ed68ef-333b-4853-86f0-85ca8a39bdd7 uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1 version = 3.0.0
24162026-01-14T21:22:49.864ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 99 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
24172026-01-14T21:22:49.864ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 99 } interface = fake-switch1 response = CabooseValue
24182026-01-14T21:22:49.864ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 100 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
24192026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 100 } interface = fake-switch1 response = CabooseValue
24202026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 101 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
24212026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 101 } interface = fake-switch1 response = CabooseValue
24222026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 102 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
24232026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 102 } interface = fake-switch1 response = CabooseValue
24242026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 103 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
24252026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 103 } interface = fake-switch1 response = CabooseValue
24262026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 104 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
24272026-01-14T21:22:49.865ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 104 } interface = fake-switch1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
24282026-01-14T21:22:49.866ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1567 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 23ed68ef-333b-4853-86f0-85ca8a39bdd7 response_code = 200 uri = /sp/switch/1/component/stage0/caboose?firmware_slot=1
24292026-01-14T21:22:49.869ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = d3ef301a-7049-4789-a1e8-f6cd072e0f81 uri = /sp/switch/1/component/rot/cmpa
24302026-01-14T21:22:49.869ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = d3ef301a-7049-4789-a1e8-f6cd072e0f81 uri = /sp/switch/1/component/rot/cmpa version = 3.0.0
24312026-01-14T21:22:49.869ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 105 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
24322026-01-14T21:22:49.870ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 105 } interface = fake-switch1 response = ReadRot(Ok)
24332026-01-14T21:22:49.870ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1286 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = d3ef301a-7049-4789-a1e8-f6cd072e0f81 response_code = 200 uri = /sp/switch/1/component/rot/cmpa
24342026-01-14T21:22:49.871ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5b862a2a-6d19-406e-921f-12bf5016aabd uri = /sp/switch/1/component/rot/cfpa
24352026-01-14T21:22:49.871ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5b862a2a-6d19-406e-921f-12bf5016aabd uri = /sp/switch/1/component/rot/cfpa version = 3.0.0
24362026-01-14T21:22:49.872ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 106 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
24372026-01-14T21:22:49.872ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 106 } interface = fake-switch1 response = ReadRot(Ok)
24382026-01-14T21:22:49.872ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 748 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5b862a2a-6d19-406e-921f-12bf5016aabd response_code = 200 uri = /sp/switch/1/component/rot/cfpa
24392026-01-14T21:22:49.875ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 4f735541-eb00-46f4-9141-4838e2df3e32 uri = /sp/switch/1/component/rot/cfpa
24402026-01-14T21:22:49.875ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 4f735541-eb00-46f4-9141-4838e2df3e32 uri = /sp/switch/1/component/rot/cfpa version = 3.0.0
24412026-01-14T21:22:49.875ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 107 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
24422026-01-14T21:22:49.876ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 107 } interface = fake-switch1 response = ReadRot(Ok)
24432026-01-14T21:22:49.876ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1212 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 4f735541-eb00-46f4-9141-4838e2df3e32 response_code = 200 uri = /sp/switch/1/component/rot/cfpa
24442026-01-14T21:22:49.884ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = c506c068-ac5b-403c-b531-c62ef5c8e25b uri = /sp/switch/1/component/rot/cfpa
24452026-01-14T21:22:49.884ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = c506c068-ac5b-403c-b531-c62ef5c8e25b uri = /sp/switch/1/component/rot/cfpa version = 3.0.0
24462026-01-14T21:22:49.885ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 108 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
24472026-01-14T21:22:49.885ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 108 } interface = fake-switch1 response = ReadRot(Ok)
24482026-01-14T21:22:49.886ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1223 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = c506c068-ac5b-403c-b531-c62ef5c8e25b response_code = 200 uri = /sp/switch/1/component/rot/cfpa
24492026-01-14T21:22:49.889ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 57ac1cc2-99ae-43b6-b621-1a42d2a442a8 uri = /sp/sled/0
24502026-01-14T21:22:49.889ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 57ac1cc2-99ae-43b6-b621-1a42d2a442a8 uri = /sp/sled/0 version = 3.0.0
24512026-01-14T21:22:49.889ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 148 }, kind: MgsRequest(SpState) }
24522026-01-14T21:22:49.904ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
24532026-01-14T21:22:49.904ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 148 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
24542026-01-14T21:22:49.905ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 149 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
24552026-01-14T21:22:49.905ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 149 } interface = fake-sled0 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
24562026-01-14T21:22:49.905ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 16732 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 57ac1cc2-99ae-43b6-b621-1a42d2a442a8 response_code = 200 uri = /sp/sled/0
24572026-01-14T21:22:49.907ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5706b16e-be67-4229-9e35-0154b6f0390f uri = /sp/sled/0/component/host-boot-flash/active-slot
24582026-01-14T21:22:49.907ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5706b16e-be67-4229-9e35-0154b6f0390f uri = /sp/sled/0/component/host-boot-flash/active-slot version = 3.0.0
24592026-01-14T21:22:49.907ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 150 }, kind: MgsRequest(ComponentGetActiveSlot(SpComponent { id: "host-boot-flash" })) }
24602026-01-14T21:22:49.907ZDEBGtest_vpc_firewall (SpComponent { id: "host-boot-flash" }): asked for component active slot slot = gimlet 0
24612026-01-14T21:22:49.907ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 150 } interface = fake-sled0 response = ComponentActiveSlot(0)
24622026-01-14T21:22:49.907ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 685 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5706b16e-be67-4229-9e35-0154b6f0390f response_code = 200 uri = /sp/sled/0/component/host-boot-flash/active-slot
24632026-01-14T21:22:49.910ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6ef9fc88-25e8-4d7d-bf52-6eea327ef289 uri = /sp/sled/0/component/host-boot-flash/hash/0
24642026-01-14T21:22:49.910ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6ef9fc88-25e8-4d7d-bf52-6eea327ef289 uri = /sp/sled/0/component/host-boot-flash/hash/0 version = 3.0.0
24652026-01-14T21:22:49.910ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 151 }, kind: MgsRequest(GetHostFlashHash { slot: 0 }) }
24662026-01-14T21:22:49.911ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 151 } interface = fake-sled0 response = HostFlashHash([53, 107, 239, 110, 220, 143, 200, 15, 34, 112, 182, 59, 102, 171, 195, 123, 41, 60, 85, 66, 172, 201, 244, 15, 90, 150, 217, 20, 162, 63, 97, 19])
24672026-01-14T21:22:49.911ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1304 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6ef9fc88-25e8-4d7d-bf52-6eea327ef289 response_code = 200 uri = /sp/sled/0/component/host-boot-flash/hash/0
24682026-01-14T21:22:49.913ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 66eac08d-0dd2-4523-90e0-01d1d02fca3c uri = /sp/sled/0/component/host-boot-flash/hash/1
24692026-01-14T21:22:49.913ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 66eac08d-0dd2-4523-90e0-01d1d02fca3c uri = /sp/sled/0/component/host-boot-flash/hash/1 version = 3.0.0
24702026-01-14T21:22:49.913ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 152 }, kind: MgsRequest(GetHostFlashHash { slot: 1 }) }
24712026-01-14T21:22:49.913ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 152 } interface = fake-sled0 response = HostFlashHash([11, 47, 169, 143, 81, 51, 178, 136, 162, 190, 126, 80, 46, 170, 224, 134, 194, 112, 189, 43, 164, 70, 214, 26, 90, 235, 161, 253, 140, 26, 154, 197])
24722026-01-14T21:22:49.914ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 915 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 66eac08d-0dd2-4523-90e0-01d1d02fca3c response_code = 200 uri = /sp/sled/0/component/host-boot-flash/hash/1
24732026-01-14T21:22:49.915ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 019d5bf3-8c52-436d-bfca-b471db65ead8 uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
24742026-01-14T21:22:49.915ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 019d5bf3-8c52-436d-bfca-b471db65ead8 uri = /sp/sled/0/component/sp/caboose?firmware_slot=0 version = 3.0.0
24752026-01-14T21:22:49.915ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 153 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
24762026-01-14T21:22:49.918ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 153 } interface = fake-sled0 response = CabooseValue
24772026-01-14T21:22:49.918ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 154 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
24782026-01-14T21:22:49.918ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 154 } interface = fake-sled0 response = CabooseValue
24792026-01-14T21:22:49.918ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 155 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
24802026-01-14T21:22:49.919ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 155 } interface = fake-sled0 response = CabooseValue
24812026-01-14T21:22:49.919ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 156 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
24822026-01-14T21:22:49.919ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 156 } interface = fake-sled0 response = CabooseValue
24832026-01-14T21:22:49.919ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 157 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
24842026-01-14T21:22:49.919ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 157 } interface = fake-sled0 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
24852026-01-14T21:22:49.919ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 158 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
24862026-01-14T21:22:49.919ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 158 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
24872026-01-14T21:22:49.920ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 5009 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 019d5bf3-8c52-436d-bfca-b471db65ead8 response_code = 200 uri = /sp/sled/0/component/sp/caboose?firmware_slot=0
24882026-01-14T21:22:49.923ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 379b5131-c631-4f92-96ff-014a4699a14e uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
24892026-01-14T21:22:49.923ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 379b5131-c631-4f92-96ff-014a4699a14e uri = /sp/sled/0/component/sp/caboose?firmware_slot=1 version = 3.0.0
24902026-01-14T21:22:49.924ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 159 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
24912026-01-14T21:22:49.924ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 159 } interface = fake-sled0 response = CabooseValue
24922026-01-14T21:22:49.924ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 160 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
24932026-01-14T21:22:49.924ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 160 } interface = fake-sled0 response = CabooseValue
24942026-01-14T21:22:49.924ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 161 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
24952026-01-14T21:22:49.925ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 161 } interface = fake-sled0 response = CabooseValue
24962026-01-14T21:22:49.925ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 162 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
24972026-01-14T21:22:49.925ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 162 } interface = fake-sled0 response = CabooseValue
24982026-01-14T21:22:49.925ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 163 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
24992026-01-14T21:22:49.925ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 163 } interface = fake-sled0 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
25002026-01-14T21:22:49.925ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 164 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
25012026-01-14T21:22:49.925ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 164 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
25022026-01-14T21:22:49.926ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2774 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 379b5131-c631-4f92-96ff-014a4699a14e response_code = 200 uri = /sp/sled/0/component/sp/caboose?firmware_slot=1
25032026-01-14T21:22:49.929ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 4e855aa9-422e-44fa-b778-fe9025312016 uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
25042026-01-14T21:22:49.930ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 4e855aa9-422e-44fa-b778-fe9025312016 uri = /sp/sled/0/component/rot/caboose?firmware_slot=0 version = 3.0.0
25052026-01-14T21:22:49.930ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 165 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
25062026-01-14T21:22:49.931ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 165 } interface = fake-sled0 response = CabooseValue
25072026-01-14T21:22:49.931ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 166 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
25082026-01-14T21:22:49.931ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 166 } interface = fake-sled0 response = CabooseValue
25092026-01-14T21:22:49.931ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 167 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
25102026-01-14T21:22:49.931ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 167 } interface = fake-sled0 response = CabooseValue
25112026-01-14T21:22:49.931ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 168 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
25122026-01-14T21:22:49.932ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 168 } interface = fake-sled0 response = CabooseValue
25132026-01-14T21:22:49.932ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 169 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
25142026-01-14T21:22:49.932ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 169 } interface = fake-sled0 response = CabooseValue
25152026-01-14T21:22:49.932ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 170 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
25162026-01-14T21:22:49.933ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 170 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
25172026-01-14T21:22:49.933ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 3234 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 4e855aa9-422e-44fa-b778-fe9025312016 response_code = 200 uri = /sp/sled/0/component/rot/caboose?firmware_slot=0
25182026-01-14T21:22:49.934ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ec17032e-b02b-429a-a23e-e464bcdf3b1d uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
25192026-01-14T21:22:49.934ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ec17032e-b02b-429a-a23e-e464bcdf3b1d uri = /sp/sled/0/component/rot/caboose?firmware_slot=1 version = 3.0.0
25202026-01-14T21:22:49.934ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 171 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
25212026-01-14T21:22:49.936ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 171 } interface = fake-sled0 response = CabooseValue
25222026-01-14T21:22:49.937ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 172 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
25232026-01-14T21:22:49.937ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 172 } interface = fake-sled0 response = CabooseValue
25242026-01-14T21:22:49.937ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 173 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
25252026-01-14T21:22:49.937ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 173 } interface = fake-sled0 response = CabooseValue
25262026-01-14T21:22:49.938ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 174 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
25272026-01-14T21:22:49.938ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 174 } interface = fake-sled0 response = CabooseValue
25282026-01-14T21:22:49.938ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 175 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
25292026-01-14T21:22:49.938ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 175 } interface = fake-sled0 response = CabooseValue
25302026-01-14T21:22:49.938ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 176 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
25312026-01-14T21:22:49.938ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 176 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
25322026-01-14T21:22:49.938ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4416 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ec17032e-b02b-429a-a23e-e464bcdf3b1d response_code = 200 uri = /sp/sled/0/component/rot/caboose?firmware_slot=1
25332026-01-14T21:22:49.941ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = e7a0daa7-2172-465f-ade0-ada92894efc2 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
25342026-01-14T21:22:49.941ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = e7a0daa7-2172-465f-ade0-ada92894efc2 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0 version = 3.0.0
25352026-01-14T21:22:49.941ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 177 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
25362026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 177 } interface = fake-sled0 response = CabooseValue
25372026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 178 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
25382026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 178 } interface = fake-sled0 response = CabooseValue
25392026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 179 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
25402026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 179 } interface = fake-sled0 response = CabooseValue
25412026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 180 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
25422026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 180 } interface = fake-sled0 response = CabooseValue
25432026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 181 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
25442026-01-14T21:22:49.942ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 181 } interface = fake-sled0 response = CabooseValue
25452026-01-14T21:22:49.943ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 182 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
25462026-01-14T21:22:49.943ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 182 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
25472026-01-14T21:22:49.943ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2245 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = e7a0daa7-2172-465f-ade0-ada92894efc2 response_code = 200 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=0
25482026-01-14T21:22:49.944ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ec0d1d59-6d8a-468d-b0ba-f49d6a8c2318 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
25492026-01-14T21:22:49.944ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ec0d1d59-6d8a-468d-b0ba-f49d6a8c2318 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1 version = 3.0.0
25502026-01-14T21:22:49.944ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 183 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
25512026-01-14T21:22:49.958ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 183 } interface = fake-sled0 response = CabooseValue
25522026-01-14T21:22:49.958ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 184 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
25532026-01-14T21:22:49.959ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 184 } interface = fake-sled0 response = CabooseValue
25542026-01-14T21:22:49.959ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 185 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
25552026-01-14T21:22:49.959ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 185 } interface = fake-sled0 response = CabooseValue
25562026-01-14T21:22:49.959ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 186 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
25572026-01-14T21:22:49.959ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 186 } interface = fake-sled0 response = CabooseValue
25582026-01-14T21:22:49.959ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 187 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
25592026-01-14T21:22:49.960ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 187 } interface = fake-sled0 response = CabooseValue
25602026-01-14T21:22:49.960ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 188 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
25612026-01-14T21:22:49.960ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 188 } interface = fake-sled0 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
25622026-01-14T21:22:49.961ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 16492 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = ec0d1d59-6d8a-468d-b0ba-f49d6a8c2318 response_code = 200 uri = /sp/sled/0/component/stage0/caboose?firmware_slot=1
25632026-01-14T21:22:49.965ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8394d20a-5eb0-4baf-a691-6af97be1ab7a uri = /sp/sled/0/component/rot/cmpa
25642026-01-14T21:22:49.965ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8394d20a-5eb0-4baf-a691-6af97be1ab7a uri = /sp/sled/0/component/rot/cmpa version = 3.0.0
25652026-01-14T21:22:49.966ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 189 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
25662026-01-14T21:22:49.967ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 189 } interface = fake-sled0 response = ReadRot(Ok)
25672026-01-14T21:22:49.967ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2478 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8394d20a-5eb0-4baf-a691-6af97be1ab7a response_code = 200 uri = /sp/sled/0/component/rot/cmpa
25682026-01-14T21:22:49.968ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a90ba466-4577-4c78-a438-f892ac0fe8e2 uri = /sp/sled/0/component/rot/cfpa
25692026-01-14T21:22:49.969ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a90ba466-4577-4c78-a438-f892ac0fe8e2 uri = /sp/sled/0/component/rot/cfpa version = 3.0.0
25702026-01-14T21:22:49.969ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 190 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
25712026-01-14T21:22:49.970ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 190 } interface = fake-sled0 response = ReadRot(Ok)
25722026-01-14T21:22:49.970ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1313 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a90ba466-4577-4c78-a438-f892ac0fe8e2 response_code = 200 uri = /sp/sled/0/component/rot/cfpa
25732026-01-14T21:22:49.972ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 19bdde2b-1cd6-4dd3-920a-c385751607de uri = /sp/sled/0/component/rot/cfpa
25742026-01-14T21:22:49.973ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 19bdde2b-1cd6-4dd3-920a-c385751607de uri = /sp/sled/0/component/rot/cfpa version = 3.0.0
25752026-01-14T21:22:49.973ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 191 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
25762026-01-14T21:22:49.974ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 191 } interface = fake-sled0 response = ReadRot(Ok)
25772026-01-14T21:22:49.975ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2242 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 19bdde2b-1cd6-4dd3-920a-c385751607de response_code = 200 uri = /sp/sled/0/component/rot/cfpa
25782026-01-14T21:22:49.976ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6bab6044-3253-46e4-95a1-fbc5d243af36 uri = /sp/sled/0/component/rot/cfpa
25792026-01-14T21:22:49.976ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6bab6044-3253-46e4-95a1-fbc5d243af36 uri = /sp/sled/0/component/rot/cfpa version = 3.0.0
25802026-01-14T21:22:49.977ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 192 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
25812026-01-14T21:22:49.977ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 192 } interface = fake-sled0 response = ReadRot(Ok)
25822026-01-14T21:22:49.979ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2526 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 6bab6044-3253-46e4-95a1-fbc5d243af36 response_code = 200 uri = /sp/sled/0/component/rot/cfpa
25832026-01-14T21:22:49.984ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = dc651d02-fc9d-493b-b70c-0e405d56a379 uri = /sp/sled/1
25842026-01-14T21:22:49.984ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = dc651d02-fc9d-493b-b70c-0e405d56a379 uri = /sp/sled/1 version = 3.0.0
25852026-01-14T21:22:49.984ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 148 }, kind: MgsRequest(SpState) }
25862026-01-14T21:22:49.985ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
25872026-01-14T21:22:49.985ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 148 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
25882026-01-14T21:22:49.986ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 149 }, kind: MgsRequest(VersionedRotBootInfo { version: 3 }) }
25892026-01-14T21:22:49.986ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 149 } interface = fake-sled1 response = RotBootInfo(V3(RotStateV3 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_fwid: Sha3_256([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_fwid: Sha3_256([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]), stage0_fwid: Sha3_256([204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204, 204]), stage0next_fwid: Sha3_256([221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221, 221]), slot_a_status: Ok(()), slot_b_status: Ok(()), stage0_status: Ok(()), stage0next_status: Ok(()) }))
25902026-01-14T21:22:49.986ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2957 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = dc651d02-fc9d-493b-b70c-0e405d56a379 response_code = 200 uri = /sp/sled/1
25912026-01-14T21:22:49.988ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 9d5220fa-6cda-402a-9f48-2715dce56f28 uri = /sp/sled/1/component/host-boot-flash/active-slot
25922026-01-14T21:22:49.988ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 9d5220fa-6cda-402a-9f48-2715dce56f28 uri = /sp/sled/1/component/host-boot-flash/active-slot version = 3.0.0
25932026-01-14T21:22:49.988ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 150 }, kind: MgsRequest(ComponentGetActiveSlot(SpComponent { id: "host-boot-flash" })) }
25942026-01-14T21:22:49.988ZDEBGtest_vpc_firewall (SpComponent { id: "host-boot-flash" }): asked for component active slot slot = gimlet 1
25952026-01-14T21:22:49.988ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 150 } interface = fake-sled1 response = ComponentActiveSlot(0)
25962026-01-14T21:22:49.988ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 553 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 9d5220fa-6cda-402a-9f48-2715dce56f28 response_code = 200 uri = /sp/sled/1/component/host-boot-flash/active-slot
25972026-01-14T21:22:49.993ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a87f6547-92c6-459e-ad14-68808f7d72ee uri = /sp/sled/1/component/host-boot-flash/hash/0
25982026-01-14T21:22:49.993ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a87f6547-92c6-459e-ad14-68808f7d72ee uri = /sp/sled/1/component/host-boot-flash/hash/0 version = 3.0.0
25992026-01-14T21:22:49.994ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 151 }, kind: MgsRequest(GetHostFlashHash { slot: 0 }) }
26002026-01-14T21:22:49.995ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 151 } interface = fake-sled1 response = HostFlashHash([53, 107, 239, 110, 220, 143, 200, 15, 34, 112, 182, 59, 102, 171, 195, 123, 41, 60, 85, 66, 172, 201, 244, 15, 90, 150, 217, 20, 162, 63, 97, 19])
26012026-01-14T21:22:49.995ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1765 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = a87f6547-92c6-459e-ad14-68808f7d72ee response_code = 200 uri = /sp/sled/1/component/host-boot-flash/hash/0
26022026-01-14T21:22:49.998ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 0354c0c0-c49b-4073-a6f0-b654e693ebea uri = /sp/sled/1/component/host-boot-flash/hash/1
26032026-01-14T21:22:49.998ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 0354c0c0-c49b-4073-a6f0-b654e693ebea uri = /sp/sled/1/component/host-boot-flash/hash/1 version = 3.0.0
26042026-01-14T21:22:49.999ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 152 }, kind: MgsRequest(GetHostFlashHash { slot: 1 }) }
26052026-01-14T21:22:50.003ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 152 } interface = fake-sled1 response = HostFlashHash([11, 47, 169, 143, 81, 51, 178, 136, 162, 190, 126, 80, 46, 170, 224, 134, 194, 112, 189, 43, 164, 70, 214, 26, 90, 235, 161, 253, 140, 26, 154, 197])
26062026-01-14T21:22:50.003ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 4569 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 0354c0c0-c49b-4073-a6f0-b654e693ebea response_code = 200 uri = /sp/sled/1/component/host-boot-flash/hash/1
26072026-01-14T21:22:50.006ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5a5a8e26-c3a5-42e7-95f3-5f2349bcbd65 uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
26082026-01-14T21:22:50.006ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5a5a8e26-c3a5-42e7-95f3-5f2349bcbd65 uri = /sp/sled/1/component/sp/caboose?firmware_slot=0 version = 3.0.0
26092026-01-14T21:22:50.007ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 153 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [71, 73, 84, 67] }) }
26102026-01-14T21:22:50.008ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 153 } interface = fake-sled1 response = CabooseValue
26112026-01-14T21:22:50.008ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 154 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [66, 79, 82, 68] }) }
26122026-01-14T21:22:50.008ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 154 } interface = fake-sled1 response = CabooseValue
26132026-01-14T21:22:50.008ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 155 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [78, 65, 77, 69] }) }
26142026-01-14T21:22:50.008ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 155 } interface = fake-sled1 response = CabooseValue
26152026-01-14T21:22:50.008ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 156 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [86, 69, 82, 83] }) }
26162026-01-14T21:22:50.011ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 156 } interface = fake-sled1 response = CabooseValue
26172026-01-14T21:22:50.012ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 157 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [83, 73, 71, 78] }) }
26182026-01-14T21:22:50.012ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 157 } interface = fake-sled1 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
26192026-01-14T21:22:50.012ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 158 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 0, key: [69, 80, 79, 67] }) }
26202026-01-14T21:22:50.012ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 158 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
26212026-01-14T21:22:50.012ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 5694 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 5a5a8e26-c3a5-42e7-95f3-5f2349bcbd65 response_code = 200 uri = /sp/sled/1/component/sp/caboose?firmware_slot=0
26222026-01-14T21:22:50.016ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = c3147186-8a09-4a79-bda1-f191e07ecd84 uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
26232026-01-14T21:22:50.017ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = c3147186-8a09-4a79-bda1-f191e07ecd84 uri = /sp/sled/1/component/sp/caboose?firmware_slot=1 version = 3.0.0
26242026-01-14T21:22:50.017ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 159 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [71, 73, 84, 67] }) }
26252026-01-14T21:22:50.017ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 159 } interface = fake-sled1 response = CabooseValue
26262026-01-14T21:22:50.017ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 160 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [66, 79, 82, 68] }) }
26272026-01-14T21:22:50.017ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 160 } interface = fake-sled1 response = CabooseValue
26282026-01-14T21:22:50.017ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 161 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [78, 65, 77, 69] }) }
26292026-01-14T21:22:50.035ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 161 } interface = fake-sled1 response = CabooseValue
26302026-01-14T21:22:50.036ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 162 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [86, 69, 82, 83] }) }
26312026-01-14T21:22:50.036ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 162 } interface = fake-sled1 response = CabooseValue
26322026-01-14T21:22:50.037ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 163 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [83, 73, 71, 78] }) }
26332026-01-14T21:22:50.038ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 163 } interface = fake-sled1 response = Error(NoSuchCabooseKey([83, 73, 71, 78]))
26342026-01-14T21:22:50.038ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 164 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "sp" }, slot: 1, key: [69, 80, 79, 67] }) }
26352026-01-14T21:22:50.038ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 164 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
26362026-01-14T21:22:50.039ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 22285 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = c3147186-8a09-4a79-bda1-f191e07ecd84 response_code = 200 uri = /sp/sled/1/component/sp/caboose?firmware_slot=1
26372026-01-14T21:22:50.042ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 2bbe282b-28d5-4e65-adb2-e508b9e77407 uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
26382026-01-14T21:22:50.042ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 2bbe282b-28d5-4e65-adb2-e508b9e77407 uri = /sp/sled/1/component/rot/caboose?firmware_slot=0 version = 3.0.0
26392026-01-14T21:22:50.043ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 165 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [71, 73, 84, 67] }) }
26402026-01-14T21:22:50.043ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 165 } interface = fake-sled1 response = CabooseValue
26412026-01-14T21:22:50.043ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 166 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [66, 79, 82, 68] }) }
26422026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 166 } interface = fake-sled1 response = CabooseValue
26432026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 167 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [78, 65, 77, 69] }) }
26442026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 167 } interface = fake-sled1 response = CabooseValue
26452026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 168 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [86, 69, 82, 83] }) }
26462026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 168 } interface = fake-sled1 response = CabooseValue
26472026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 169 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [83, 73, 71, 78] }) }
26482026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 169 } interface = fake-sled1 response = CabooseValue
26492026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 170 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 0, key: [69, 80, 79, 67] }) }
26502026-01-14T21:22:50.048ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 170 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
26512026-01-14T21:22:50.048ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 3396 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 2bbe282b-28d5-4e65-adb2-e508b9e77407 response_code = 200 uri = /sp/sled/1/component/rot/caboose?firmware_slot=0
26522026-01-14T21:22:50.049ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = e9fd38c3-f2c2-4139-84af-0e5b2fe54237 uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
26532026-01-14T21:22:50.049ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = e9fd38c3-f2c2-4139-84af-0e5b2fe54237 uri = /sp/sled/1/component/rot/caboose?firmware_slot=1 version = 3.0.0
26542026-01-14T21:22:50.049ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 171 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [71, 73, 84, 67] }) }
26552026-01-14T21:22:50.049ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 171 } interface = fake-sled1 response = CabooseValue
26562026-01-14T21:22:50.049ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 172 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [66, 79, 82, 68] }) }
26572026-01-14T21:22:50.050ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 172 } interface = fake-sled1 response = CabooseValue
26582026-01-14T21:22:50.051ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 173 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [78, 65, 77, 69] }) }
26592026-01-14T21:22:50.051ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 173 } interface = fake-sled1 response = CabooseValue
26602026-01-14T21:22:50.051ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 174 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [86, 69, 82, 83] }) }
26612026-01-14T21:22:50.051ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 174 } interface = fake-sled1 response = CabooseValue
26622026-01-14T21:22:50.051ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 175 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [83, 73, 71, 78] }) }
26632026-01-14T21:22:50.051ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 175 } interface = fake-sled1 response = CabooseValue
26642026-01-14T21:22:50.051ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 176 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "rot" }, slot: 1, key: [69, 80, 79, 67] }) }
26652026-01-14T21:22:50.051ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 176 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
26662026-01-14T21:22:50.051ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2728 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = e9fd38c3-f2c2-4139-84af-0e5b2fe54237 response_code = 200 uri = /sp/sled/1/component/rot/caboose?firmware_slot=1
26672026-01-14T21:22:50.052ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = df1dc756-053d-41d4-9abb-89441c4479d0 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
26682026-01-14T21:22:50.052ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = df1dc756-053d-41d4-9abb-89441c4479d0 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0 version = 3.0.0
26692026-01-14T21:22:50.052ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 177 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [71, 73, 84, 67] }) }
26702026-01-14T21:22:50.053ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 177 } interface = fake-sled1 response = CabooseValue
26712026-01-14T21:22:50.053ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 178 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [66, 79, 82, 68] }) }
26722026-01-14T21:22:50.075ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 178 } interface = fake-sled1 response = CabooseValue
26732026-01-14T21:22:50.075ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 179 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [78, 65, 77, 69] }) }
26742026-01-14T21:22:50.076ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 179 } interface = fake-sled1 response = CabooseValue
26752026-01-14T21:22:50.076ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 180 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [86, 69, 82, 83] }) }
26762026-01-14T21:22:50.077ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 180 } interface = fake-sled1 response = CabooseValue
26772026-01-14T21:22:50.077ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 181 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [83, 73, 71, 78] }) }
26782026-01-14T21:22:50.077ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 181 } interface = fake-sled1 response = CabooseValue
26792026-01-14T21:22:50.077ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 182 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 0, key: [69, 80, 79, 67] }) }
26802026-01-14T21:22:50.077ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 182 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
26812026-01-14T21:22:50.077ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 25291 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = df1dc756-053d-41d4-9abb-89441c4479d0 response_code = 200 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=0
26822026-01-14T21:22:50.079ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 05cecb9b-2c39-4977-b980-da5d9484eaf6 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
26832026-01-14T21:22:50.079ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 05cecb9b-2c39-4977-b980-da5d9484eaf6 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1 version = 3.0.0
26842026-01-14T21:22:50.080ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 183 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [71, 73, 84, 67] }) }
26852026-01-14T21:22:50.083ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 183 } interface = fake-sled1 response = CabooseValue
26862026-01-14T21:22:50.083ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 184 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [66, 79, 82, 68] }) }
26872026-01-14T21:22:50.083ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 184 } interface = fake-sled1 response = CabooseValue
26882026-01-14T21:22:50.083ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 185 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [78, 65, 77, 69] }) }
26892026-01-14T21:22:50.084ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 185 } interface = fake-sled1 response = CabooseValue
26902026-01-14T21:22:50.084ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 186 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [86, 69, 82, 83] }) }
26912026-01-14T21:22:50.084ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 186 } interface = fake-sled1 response = CabooseValue
26922026-01-14T21:22:50.084ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 187 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [83, 73, 71, 78] }) }
26932026-01-14T21:22:50.084ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 187 } interface = fake-sled1 response = CabooseValue
26942026-01-14T21:22:50.085ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 188 }, kind: MgsRequest(ReadComponentCaboose { component: SpComponent { id: "stage0" }, slot: 1, key: [69, 80, 79, 67] }) }
26952026-01-14T21:22:50.085ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 188 } interface = fake-sled1 response = Error(NoSuchCabooseKey([69, 80, 79, 67]))
26962026-01-14T21:22:50.085ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 6042 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 05cecb9b-2c39-4977-b980-da5d9484eaf6 response_code = 200 uri = /sp/sled/1/component/stage0/caboose?firmware_slot=1
26972026-01-14T21:22:50.090ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 49e39649-0d0f-46ef-b88e-52b4efa9a3e1 uri = /sp/sled/1/component/rot/cmpa
26982026-01-14T21:22:50.090ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 49e39649-0d0f-46ef-b88e-52b4efa9a3e1 uri = /sp/sled/1/component/rot/cmpa version = 3.0.0
26992026-01-14T21:22:50.091ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 189 }, kind: MgsRequest(ReadRot(ReadCmpa)) }
27002026-01-14T21:22:50.091ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 189 } interface = fake-sled1 response = ReadRot(Ok)
27012026-01-14T21:22:50.092ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1802 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 49e39649-0d0f-46ef-b88e-52b4efa9a3e1 response_code = 200 uri = /sp/sled/1/component/rot/cmpa
27022026-01-14T21:22:50.094ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8c3605ef-589e-430a-be7a-068f09d31955 uri = /sp/sled/1/component/rot/cfpa
27032026-01-14T21:22:50.094ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8c3605ef-589e-430a-be7a-068f09d31955 uri = /sp/sled/1/component/rot/cfpa version = 3.0.0
27042026-01-14T21:22:50.094ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 190 }, kind: MgsRequest(ReadRot(ReadCfpa(Active))) }
27052026-01-14T21:22:50.094ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 190 } interface = fake-sled1 response = ReadRot(Ok)
27062026-01-14T21:22:50.094ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1005 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8c3605ef-589e-430a-be7a-068f09d31955 response_code = 200 uri = /sp/sled/1/component/rot/cfpa
27072026-01-14T21:22:50.098ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8485085a-23be-4e95-8e05-1f5f740796ae uri = /sp/sled/1/component/rot/cfpa
27082026-01-14T21:22:50.099ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8485085a-23be-4e95-8e05-1f5f740796ae uri = /sp/sled/1/component/rot/cfpa version = 3.0.0
27092026-01-14T21:22:50.099ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 191 }, kind: MgsRequest(ReadRot(ReadCfpa(Inactive))) }
27102026-01-14T21:22:50.100ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 191 } interface = fake-sled1 response = ReadRot(Ok)
27112026-01-14T21:22:50.100ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 2161 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 8485085a-23be-4e95-8e05-1f5f740796ae response_code = 200 uri = /sp/sled/1/component/rot/cfpa
27122026-01-14T21:22:50.102ZTRACtest_vpc_firewall (dropshot): incoming request local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 2500cc9d-bb68-4526-abc5-c2394437a0f2 uri = /sp/sled/1/component/rot/cfpa
27132026-01-14T21:22:50.102ZDEBGtest_vpc_firewall (dropshot): determined request API version local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 2500cc9d-bb68-4526-abc5-c2394437a0f2 uri = /sp/sled/1/component/rot/cfpa version = 3.0.0
27142026-01-14T21:22:50.103ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 192 }, kind: MgsRequest(ReadRot(ReadCfpa(Scratch))) }
27152026-01-14T21:22:50.103ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 192 } interface = fake-sled1 response = ReadRot(Ok)
27162026-01-14T21:22:50.103ZINFOtest_vpc_firewall (dropshot): request completed latency_us = 1257 local_addr = [::1]:59250 method = GET remote_addr = [::1]:46538 req_id = 2500cc9d-bb68-4526-abc5-c2394437a0f2 response_code = 200 uri = /sp/sled/1/component/rot/cfpa
27172026-01-14T21:22:50.605ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
27182026-01-14T21:22:50.605ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
27192026-01-14T21:22:50.605ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
27202026-01-14T21:22:50.605ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
27212026-01-14T21:22:50.605ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 109 }, kind: MgsRequest(SpState) }
27222026-01-14T21:22:50.606ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 135 }, kind: MgsRequest(SpState) }
27232026-01-14T21:22:50.606ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 193 }, kind: MgsRequest(SpState) }
27242026-01-14T21:22:50.610ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 193 }, kind: MgsRequest(SpState) }
27252026-01-14T21:22:50.611ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
27262026-01-14T21:22:50.611ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
27272026-01-14T21:22:50.611ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
27282026-01-14T21:22:50.611ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
27292026-01-14T21:22:50.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 135 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
27302026-01-14T21:22:50.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 109 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
27312026-01-14T21:22:50.612ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 193 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
27322026-01-14T21:22:50.612ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 193 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
27332026-01-14T21:22:50.612ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 136 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
27342026-01-14T21:22:50.612ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 110 }, kind: MgsRequest(SpState) }
27352026-01-14T21:22:50.612ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 194 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
27362026-01-14T21:22:50.612ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 194 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
27372026-01-14T21:22:50.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
27382026-01-14T21:22:50.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
27392026-01-14T21:22:50.613ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
27402026-01-14T21:22:50.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
27412026-01-14T21:22:50.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
27422026-01-14T21:22:50.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
27432026-01-14T21:22:50.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
27442026-01-14T21:22:50.613ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 136 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27452026-01-14T21:22:50.613ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 110 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
27462026-01-14T21:22:50.613ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 194 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27472026-01-14T21:22:50.613ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 194 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27482026-01-14T21:22:50.614ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
27492026-01-14T21:22:50.632ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 137 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
27502026-01-14T21:22:50.632ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 195 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
27512026-01-14T21:22:50.633ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 195 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
27522026-01-14T21:22:50.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
27532026-01-14T21:22:50.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
27542026-01-14T21:22:50.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
27552026-01-14T21:22:50.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
27562026-01-14T21:22:50.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
27572026-01-14T21:22:50.636ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
27582026-01-14T21:22:50.636ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 137 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27592026-01-14T21:22:50.636ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 195 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27602026-01-14T21:22:50.637ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 195 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27612026-01-14T21:22:50.641ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 138 }, kind: MgsRequest(SpState) }
27622026-01-14T21:22:50.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 196 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
27632026-01-14T21:22:50.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 196 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
27642026-01-14T21:22:50.643ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
27652026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
27662026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
27672026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
27682026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
27692026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
27702026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
27712026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
27722026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
27732026-01-14T21:22:50.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
27742026-01-14T21:22:50.645ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 138 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
27752026-01-14T21:22:50.645ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 196 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27762026-01-14T21:22:50.645ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 196 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
27772026-01-14T21:22:50.646ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
27782026-01-14T21:22:50.658ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 197 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
27792026-01-14T21:22:50.658ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 197 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
27802026-01-14T21:22:50.663ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
27812026-01-14T21:22:50.663ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
27822026-01-14T21:22:50.663ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
27832026-01-14T21:22:50.663ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
27842026-01-14T21:22:50.663ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
27852026-01-14T21:22:50.664ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
27862026-01-14T21:22:50.664ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
27872026-01-14T21:22:50.667ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 197 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
27882026-01-14T21:22:50.667ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 197 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27892026-01-14T21:22:50.672ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 198 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
27902026-01-14T21:22:50.672ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 198 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
27912026-01-14T21:22:50.674ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
27922026-01-14T21:22:50.675ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
27932026-01-14T21:22:50.675ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
27942026-01-14T21:22:50.677ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
27952026-01-14T21:22:50.695ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 198 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27962026-01-14T21:22:50.695ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 198 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
27972026-01-14T21:22:50.699ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 199 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
27982026-01-14T21:22:50.699ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 199 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
27992026-01-14T21:22:50.700ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
28002026-01-14T21:22:50.700ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
28012026-01-14T21:22:50.700ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
28022026-01-14T21:22:50.700ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
28032026-01-14T21:22:50.701ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 199 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28042026-01-14T21:22:50.701ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 199 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28052026-01-14T21:22:50.704ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 200 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
28062026-01-14T21:22:50.704ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 200 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
28072026-01-14T21:22:50.707ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
28082026-01-14T21:22:50.707ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
28092026-01-14T21:22:50.707ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
28102026-01-14T21:22:50.707ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
28112026-01-14T21:22:50.707ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
28122026-01-14T21:22:50.707ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
28132026-01-14T21:22:50.707ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
28142026-01-14T21:22:50.710ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 200 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28152026-01-14T21:22:50.710ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 200 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
28162026-01-14T21:22:50.713ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 201 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
28172026-01-14T21:22:50.713ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 201 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
28182026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
28192026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
28202026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
28212026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
28222026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
28232026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
28242026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
28252026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
28262026-01-14T21:22:50.716ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
28272026-01-14T21:22:50.716ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 201 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
28282026-01-14T21:22:50.716ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 201 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28292026-01-14T21:22:50.719ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 202 }, kind: MgsRequest(SpState) }
28302026-01-14T21:22:50.720ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 202 }, kind: MgsRequest(SpState) }
28312026-01-14T21:22:50.720ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
28322026-01-14T21:22:50.720ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
28332026-01-14T21:22:50.720ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 202 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
28342026-01-14T21:22:50.720ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 202 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
28352026-01-14T21:22:50.720ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
28362026-01-14T21:22:50.720ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
28372026-01-14T21:22:51.594ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
28382026-01-14T21:22:51.594ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
28392026-01-14T21:22:51.594ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
28402026-01-14T21:22:51.594ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
28412026-01-14T21:22:51.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 111 }, kind: MgsRequest(SpState) }
28422026-01-14T21:22:51.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 139 }, kind: MgsRequest(SpState) }
28432026-01-14T21:22:51.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 203 }, kind: MgsRequest(SpState) }
28442026-01-14T21:22:51.594ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 203 }, kind: MgsRequest(SpState) }
28452026-01-14T21:22:51.594ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
28462026-01-14T21:22:51.595ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
28472026-01-14T21:22:51.595ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
28482026-01-14T21:22:51.595ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
28492026-01-14T21:22:51.596ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 139 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
28502026-01-14T21:22:51.596ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 111 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
28512026-01-14T21:22:51.596ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 203 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
28522026-01-14T21:22:51.596ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 203 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
28532026-01-14T21:22:51.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 140 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
28542026-01-14T21:22:51.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 112 }, kind: MgsRequest(SpState) }
28552026-01-14T21:22:51.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 204 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
28562026-01-14T21:22:51.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 204 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
28572026-01-14T21:22:51.596ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
28582026-01-14T21:22:51.596ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
28592026-01-14T21:22:51.596ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
28602026-01-14T21:22:51.596ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
28612026-01-14T21:22:51.596ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
28622026-01-14T21:22:51.596ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
28632026-01-14T21:22:51.596ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
28642026-01-14T21:22:51.597ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 140 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28652026-01-14T21:22:51.597ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 112 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
28662026-01-14T21:22:51.597ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 204 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28672026-01-14T21:22:51.597ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 204 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28682026-01-14T21:22:51.599ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
28692026-01-14T21:22:51.601ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 141 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
28702026-01-14T21:22:51.602ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 205 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
28712026-01-14T21:22:51.602ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 205 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
28722026-01-14T21:22:51.611ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
28732026-01-14T21:22:51.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
28742026-01-14T21:22:51.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
28752026-01-14T21:22:51.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
28762026-01-14T21:22:51.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
28772026-01-14T21:22:51.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
28782026-01-14T21:22:52.307ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 141 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28792026-01-14T21:22:52.307ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 205 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28802026-01-14T21:22:52.307ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 205 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28812026-01-14T21:22:52.399ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 142 }, kind: MgsRequest(SpState) }
28822026-01-14T21:22:52.400ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 206 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
28832026-01-14T21:22:52.400ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 206 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
28842026-01-14T21:22:52.400ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
28852026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
28862026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
28872026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
28882026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
28892026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
28902026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
28912026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
28922026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
28932026-01-14T21:22:52.401ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
28942026-01-14T21:22:52.401ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 142 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
28952026-01-14T21:22:52.401ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 206 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
28962026-01-14T21:22:52.401ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 206 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
28972026-01-14T21:22:52.402ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
28982026-01-14T21:22:52.410ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 207 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
28992026-01-14T21:22:52.410ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 207 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
29002026-01-14T21:22:52.412ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
29012026-01-14T21:22:52.413ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
29022026-01-14T21:22:52.413ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
29032026-01-14T21:22:52.413ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
29042026-01-14T21:22:52.413ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
29052026-01-14T21:22:52.413ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
29062026-01-14T21:22:52.413ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
29072026-01-14T21:22:52.416ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 207 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
29082026-01-14T21:22:52.416ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 207 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29092026-01-14T21:22:52.421ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 208 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
29102026-01-14T21:22:52.421ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 208 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
29112026-01-14T21:22:52.422ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
29122026-01-14T21:22:52.423ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
29132026-01-14T21:22:52.423ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
29142026-01-14T21:22:52.423ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
29152026-01-14T21:22:52.423ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 208 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29162026-01-14T21:22:52.423ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 208 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29172026-01-14T21:22:52.426ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 209 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
29182026-01-14T21:22:52.427ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 209 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
29192026-01-14T21:22:52.428ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
29202026-01-14T21:22:52.428ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
29212026-01-14T21:22:52.428ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
29222026-01-14T21:22:52.428ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
29232026-01-14T21:22:52.437ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 209 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29242026-01-14T21:22:52.438ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 209 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29252026-01-14T21:22:52.549ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 210 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
29262026-01-14T21:22:52.549ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 210 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
29272026-01-14T21:22:52.551ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
29282026-01-14T21:22:52.551ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
29292026-01-14T21:22:52.551ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
29302026-01-14T21:22:52.551ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
29312026-01-14T21:22:52.551ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
29322026-01-14T21:22:52.551ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
29332026-01-14T21:22:52.551ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
29342026-01-14T21:22:52.556ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 210 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29352026-01-14T21:22:52.556ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 210 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
29362026-01-14T21:22:52.567ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 211 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
29372026-01-14T21:22:52.568ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 211 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
29382026-01-14T21:22:52.568ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
29392026-01-14T21:22:52.568ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
29402026-01-14T21:22:52.568ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
29412026-01-14T21:22:52.568ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
29422026-01-14T21:22:52.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
29432026-01-14T21:22:52.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
29442026-01-14T21:22:52.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
29452026-01-14T21:22:52.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
29462026-01-14T21:22:52.569ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
29472026-01-14T21:22:52.571ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 211 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
29482026-01-14T21:22:52.572ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 211 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29492026-01-14T21:22:52.578ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 212 }, kind: MgsRequest(SpState) }
29502026-01-14T21:22:52.579ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 212 }, kind: MgsRequest(SpState) }
29512026-01-14T21:22:52.581ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
29522026-01-14T21:22:52.581ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
29532026-01-14T21:22:52.583ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 212 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
29542026-01-14T21:22:52.583ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 212 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
29552026-01-14T21:22:52.584ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
29562026-01-14T21:22:52.584ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
29572026-01-14T21:22:52.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
29582026-01-14T21:22:52.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
29592026-01-14T21:22:52.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
29602026-01-14T21:22:52.595ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
29612026-01-14T21:22:52.595ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 113 }, kind: MgsRequest(SpState) }
29622026-01-14T21:22:52.595ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 143 }, kind: MgsRequest(SpState) }
29632026-01-14T21:22:52.595ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 213 }, kind: MgsRequest(SpState) }
29642026-01-14T21:22:52.595ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 213 }, kind: MgsRequest(SpState) }
29652026-01-14T21:22:52.600ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
29662026-01-14T21:22:52.601ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
29672026-01-14T21:22:52.601ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
29682026-01-14T21:22:52.601ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
29692026-01-14T21:22:52.682ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 143 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
29702026-01-14T21:22:52.682ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 113 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
29712026-01-14T21:22:52.682ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 213 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
29722026-01-14T21:22:52.682ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 213 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
29732026-01-14T21:22:52.689ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 144 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
29742026-01-14T21:22:52.689ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 114 }, kind: MgsRequest(SpState) }
29752026-01-14T21:22:52.689ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 214 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
29762026-01-14T21:22:52.689ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 214 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
29772026-01-14T21:22:52.691ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
29782026-01-14T21:22:52.691ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
29792026-01-14T21:22:52.691ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
29802026-01-14T21:22:52.691ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
29812026-01-14T21:22:52.691ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
29822026-01-14T21:22:52.691ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
29832026-01-14T21:22:52.691ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
29842026-01-14T21:22:52.717ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 144 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29852026-01-14T21:22:52.717ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 114 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
29862026-01-14T21:22:52.718ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 214 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29872026-01-14T21:22:52.718ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 214 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29882026-01-14T21:22:52.720ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
29892026-01-14T21:22:52.732ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 145 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
29902026-01-14T21:22:52.733ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 215 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
29912026-01-14T21:22:52.733ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 215 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
29922026-01-14T21:22:52.823ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
29932026-01-14T21:22:52.823ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
29942026-01-14T21:22:52.823ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
29952026-01-14T21:22:52.823ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
29962026-01-14T21:22:52.824ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
29972026-01-14T21:22:52.824ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
29982026-01-14T21:22:52.904ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 145 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
29992026-01-14T21:22:52.904ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 215 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30002026-01-14T21:22:52.904ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 215 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30012026-01-14T21:22:52.921ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 146 }, kind: MgsRequest(SpState) }
30022026-01-14T21:22:52.921ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 216 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
30032026-01-14T21:22:52.921ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 216 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
30042026-01-14T21:22:52.974ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
30052026-01-14T21:22:52.974ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
30062026-01-14T21:22:52.974ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
30072026-01-14T21:22:52.975ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
30082026-01-14T21:22:52.975ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
30092026-01-14T21:22:52.975ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
30102026-01-14T21:22:52.975ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
30112026-01-14T21:22:52.975ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
30122026-01-14T21:22:52.975ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
30132026-01-14T21:22:52.976ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
30142026-01-14T21:22:53.055ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 146 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
30152026-01-14T21:22:53.055ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 216 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30162026-01-14T21:22:53.055ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 216 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
30172026-01-14T21:22:53.059ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
30182026-01-14T21:22:53.066ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 217 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
30192026-01-14T21:22:53.066ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 217 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
30202026-01-14T21:22:53.088ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
30212026-01-14T21:22:53.088ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
30222026-01-14T21:22:53.088ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
30232026-01-14T21:22:53.089ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
30242026-01-14T21:22:53.089ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
30252026-01-14T21:22:53.089ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
30262026-01-14T21:22:53.089ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
30272026-01-14T21:22:53.205ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 217 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
30282026-01-14T21:22:53.205ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 217 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30292026-01-14T21:22:53.218ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 218 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
30302026-01-14T21:22:53.219ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 218 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
30312026-01-14T21:22:53.243ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
30322026-01-14T21:22:53.243ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
30332026-01-14T21:22:53.244ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
30342026-01-14T21:22:53.244ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
30352026-01-14T21:22:53.254ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 218 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30362026-01-14T21:22:53.254ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 218 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30372026-01-14T21:22:53.259ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 219 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
30382026-01-14T21:22:53.259ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 219 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
30392026-01-14T21:22:53.285ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
30402026-01-14T21:22:53.285ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
30412026-01-14T21:22:53.286ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
30422026-01-14T21:22:53.287ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
30432026-01-14T21:22:53.302ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 219 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30442026-01-14T21:22:53.303ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 219 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30452026-01-14T21:22:53.306ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 220 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
30462026-01-14T21:22:53.306ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 220 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
30472026-01-14T21:22:53.309ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
30482026-01-14T21:22:53.309ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
30492026-01-14T21:22:53.309ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
30502026-01-14T21:22:53.309ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
30512026-01-14T21:22:53.309ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
30522026-01-14T21:22:53.309ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
30532026-01-14T21:22:53.309ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
30542026-01-14T21:22:53.312ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 220 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30552026-01-14T21:22:53.313ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 220 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
30562026-01-14T21:22:53.321ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 221 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
30572026-01-14T21:22:53.321ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 221 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
30582026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
30592026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
30602026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
30612026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
30622026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
30632026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
30642026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
30652026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
30662026-01-14T21:22:53.326ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
30672026-01-14T21:22:53.338ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 221 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
30682026-01-14T21:22:53.338ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 221 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
30692026-01-14T21:22:53.346ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 222 }, kind: MgsRequest(SpState) }
30702026-01-14T21:22:53.346ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 222 }, kind: MgsRequest(SpState) }
30712026-01-14T21:22:53.353ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
30722026-01-14T21:22:53.353ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
30732026-01-14T21:22:53.354ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 222 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
30742026-01-14T21:22:53.354ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 222 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
30752026-01-14T21:22:53.355ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
30762026-01-14T21:22:53.355ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
30772026-01-14T21:22:53.436ZTRACtest_vpc_firewall (internal-dns-resolver): lookup_socket_v6 srv dns_name = _nexus._tcp.control-plane.oxide.internal
30782026-01-14T21:22:53.440ZWARNtest_vpc_firewall (producer-registration-task): failed to register with Nexus, will retry count = 6 delay = 15.877203778s error = "proto error: io error: No route to host (os error 148)" file = oximeter/producer/src/lib.rs:371
30792026-01-14T21:22:53.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
30802026-01-14T21:22:53.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
30812026-01-14T21:22:53.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
30822026-01-14T21:22:53.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
30832026-01-14T21:22:53.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 115 }, kind: MgsRequest(SpState) }
30842026-01-14T21:22:53.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 147 }, kind: MgsRequest(SpState) }
30852026-01-14T21:22:53.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 223 }, kind: MgsRequest(SpState) }
30862026-01-14T21:22:53.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 223 }, kind: MgsRequest(SpState) }
30872026-01-14T21:22:53.609ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
30882026-01-14T21:22:53.609ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
30892026-01-14T21:22:53.609ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
30902026-01-14T21:22:53.610ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
30912026-01-14T21:22:53.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 147 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
30922026-01-14T21:22:53.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 115 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
30932026-01-14T21:22:53.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 223 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
30942026-01-14T21:22:53.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 223 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
30952026-01-14T21:22:53.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 148 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
30962026-01-14T21:22:53.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 116 }, kind: MgsRequest(SpState) }
30972026-01-14T21:22:53.612ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 224 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
30982026-01-14T21:22:53.612ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 224 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
30992026-01-14T21:22:53.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
31002026-01-14T21:22:53.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
31012026-01-14T21:22:53.613ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
31022026-01-14T21:22:53.613ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
31032026-01-14T21:22:53.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
31042026-01-14T21:22:53.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
31052026-01-14T21:22:53.614ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
31062026-01-14T21:22:53.614ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 148 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31072026-01-14T21:22:53.615ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 116 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
31082026-01-14T21:22:53.615ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 224 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31092026-01-14T21:22:53.615ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 224 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31102026-01-14T21:22:53.617ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
31112026-01-14T21:22:53.618ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 149 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
31122026-01-14T21:22:53.619ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 225 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
31132026-01-14T21:22:53.619ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 225 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
31142026-01-14T21:22:53.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
31152026-01-14T21:22:53.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
31162026-01-14T21:22:53.620ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
31172026-01-14T21:22:53.620ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
31182026-01-14T21:22:53.620ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
31192026-01-14T21:22:53.620ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
31202026-01-14T21:22:53.620ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 149 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31212026-01-14T21:22:53.620ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 225 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31222026-01-14T21:22:53.620ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 225 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31232026-01-14T21:22:53.625ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 150 }, kind: MgsRequest(SpState) }
31242026-01-14T21:22:53.626ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 226 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
31252026-01-14T21:22:53.626ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 226 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
31262026-01-14T21:22:53.626ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
31272026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
31282026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
31292026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
31302026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
31312026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
31322026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
31332026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
31342026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
31352026-01-14T21:22:53.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
31362026-01-14T21:22:53.626ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 150 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
31372026-01-14T21:22:53.627ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 226 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31382026-01-14T21:22:53.627ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 226 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
31392026-01-14T21:22:53.627ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
31402026-01-14T21:22:53.634ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 227 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
31412026-01-14T21:22:53.634ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 227 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
31422026-01-14T21:22:53.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
31432026-01-14T21:22:53.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
31442026-01-14T21:22:53.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
31452026-01-14T21:22:53.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
31462026-01-14T21:22:53.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
31472026-01-14T21:22:53.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
31482026-01-14T21:22:53.635ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
31492026-01-14T21:22:53.635ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 227 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
31502026-01-14T21:22:53.635ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 227 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31512026-01-14T21:22:53.638ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 228 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
31522026-01-14T21:22:53.638ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 228 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
31532026-01-14T21:22:53.638ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
31542026-01-14T21:22:53.638ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
31552026-01-14T21:22:53.638ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
31562026-01-14T21:22:53.638ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
31572026-01-14T21:22:53.639ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 228 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31582026-01-14T21:22:53.639ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 228 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31592026-01-14T21:22:53.640ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 229 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
31602026-01-14T21:22:53.640ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 229 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
31612026-01-14T21:22:53.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
31622026-01-14T21:22:53.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
31632026-01-14T21:22:53.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
31642026-01-14T21:22:53.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
31652026-01-14T21:22:53.640ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 229 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31662026-01-14T21:22:53.640ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 229 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31672026-01-14T21:22:53.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 230 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
31682026-01-14T21:22:53.642ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 230 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
31692026-01-14T21:22:53.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
31702026-01-14T21:22:53.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
31712026-01-14T21:22:53.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
31722026-01-14T21:22:53.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
31732026-01-14T21:22:53.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
31742026-01-14T21:22:53.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
31752026-01-14T21:22:53.642ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
31762026-01-14T21:22:53.642ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 230 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31772026-01-14T21:22:53.642ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 230 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
31782026-01-14T21:22:53.647ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 231 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
31792026-01-14T21:22:53.647ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 231 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
31802026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
31812026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
31822026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
31832026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
31842026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
31852026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
31862026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
31872026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
31882026-01-14T21:22:53.648ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
31892026-01-14T21:22:53.648ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 231 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
31902026-01-14T21:22:53.648ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 231 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
31912026-01-14T21:22:53.653ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 232 }, kind: MgsRequest(SpState) }
31922026-01-14T21:22:53.653ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 232 }, kind: MgsRequest(SpState) }
31932026-01-14T21:22:53.653ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
31942026-01-14T21:22:53.653ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
31952026-01-14T21:22:53.654ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 232 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
31962026-01-14T21:22:53.654ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 232 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
31972026-01-14T21:22:53.654ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
31982026-01-14T21:22:53.654ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
31992026-01-14T21:22:54.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
32002026-01-14T21:22:54.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
32012026-01-14T21:22:54.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
32022026-01-14T21:22:54.596ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
32032026-01-14T21:22:54.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 117 }, kind: MgsRequest(SpState) }
32042026-01-14T21:22:54.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 151 }, kind: MgsRequest(SpState) }
32052026-01-14T21:22:54.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 233 }, kind: MgsRequest(SpState) }
32062026-01-14T21:22:54.596ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 233 }, kind: MgsRequest(SpState) }
32072026-01-14T21:22:54.596ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
32082026-01-14T21:22:54.596ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
32092026-01-14T21:22:54.597ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
32102026-01-14T21:22:54.597ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
32112026-01-14T21:22:54.597ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 151 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
32122026-01-14T21:22:54.597ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 117 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
32132026-01-14T21:22:54.597ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 233 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
32142026-01-14T21:22:54.597ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 233 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
32152026-01-14T21:22:54.597ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 152 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
32162026-01-14T21:22:54.597ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 118 }, kind: MgsRequest(SpState) }
32172026-01-14T21:22:54.597ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 234 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
32182026-01-14T21:22:54.597ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 234 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
32192026-01-14T21:22:54.597ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
32202026-01-14T21:22:54.597ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
32212026-01-14T21:22:54.597ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
32222026-01-14T21:22:54.597ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
32232026-01-14T21:22:54.597ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
32242026-01-14T21:22:54.598ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
32252026-01-14T21:22:54.598ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
32262026-01-14T21:22:54.610ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 152 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32272026-01-14T21:22:54.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 118 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
32282026-01-14T21:22:54.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 234 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32292026-01-14T21:22:54.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 234 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32302026-01-14T21:22:54.612ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
32312026-01-14T21:22:54.614ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 153 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
32322026-01-14T21:22:54.615ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 235 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
32332026-01-14T21:22:54.615ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 235 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
32342026-01-14T21:22:54.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
32352026-01-14T21:22:54.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
32362026-01-14T21:22:54.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
32372026-01-14T21:22:54.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
32382026-01-14T21:22:54.615ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
32392026-01-14T21:22:54.616ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
32402026-01-14T21:22:54.619ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 153 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32412026-01-14T21:22:54.619ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 235 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32422026-01-14T21:22:54.619ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 235 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32432026-01-14T21:22:54.622ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 154 }, kind: MgsRequest(SpState) }
32442026-01-14T21:22:54.622ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 236 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
32452026-01-14T21:22:54.622ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 236 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
32462026-01-14T21:22:54.624ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
32472026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
32482026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
32492026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
32502026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
32512026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
32522026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
32532026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
32542026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
32552026-01-14T21:22:54.625ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
32562026-01-14T21:22:54.627ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 154 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
32572026-01-14T21:22:54.628ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 236 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32582026-01-14T21:22:54.628ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 236 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
32592026-01-14T21:22:54.628ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
32602026-01-14T21:22:54.633ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 237 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
32612026-01-14T21:22:54.633ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 237 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
32622026-01-14T21:22:54.633ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
32632026-01-14T21:22:54.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
32642026-01-14T21:22:54.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
32652026-01-14T21:22:54.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
32662026-01-14T21:22:54.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
32672026-01-14T21:22:54.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
32682026-01-14T21:22:54.634ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
32692026-01-14T21:22:54.638ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 237 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
32702026-01-14T21:22:54.638ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 237 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32712026-01-14T21:22:54.644ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 238 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
32722026-01-14T21:22:54.644ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 238 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
32732026-01-14T21:22:54.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
32742026-01-14T21:22:54.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
32752026-01-14T21:22:54.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
32762026-01-14T21:22:54.644ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
32772026-01-14T21:22:54.647ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 238 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32782026-01-14T21:22:54.647ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 238 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32792026-01-14T21:22:54.652ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 239 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
32802026-01-14T21:22:54.652ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 239 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
32812026-01-14T21:22:54.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
32822026-01-14T21:22:54.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
32832026-01-14T21:22:54.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
32842026-01-14T21:22:54.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
32852026-01-14T21:22:54.653ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 239 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32862026-01-14T21:22:54.653ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 239 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32872026-01-14T21:22:54.656ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 240 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
32882026-01-14T21:22:54.656ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 240 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
32892026-01-14T21:22:54.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
32902026-01-14T21:22:54.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
32912026-01-14T21:22:54.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
32922026-01-14T21:22:54.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
32932026-01-14T21:22:54.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
32942026-01-14T21:22:54.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
32952026-01-14T21:22:54.656ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
32962026-01-14T21:22:54.657ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 240 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
32972026-01-14T21:22:54.657ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 240 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
32982026-01-14T21:22:54.661ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 241 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
32992026-01-14T21:22:54.661ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 241 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
33002026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
33012026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
33022026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
33032026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
33042026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
33052026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
33062026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
33072026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
33082026-01-14T21:22:54.662ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
33092026-01-14T21:22:54.662ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 241 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
33102026-01-14T21:22:54.662ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 241 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33112026-01-14T21:22:54.668ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 242 }, kind: MgsRequest(SpState) }
33122026-01-14T21:22:54.668ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 242 }, kind: MgsRequest(SpState) }
33132026-01-14T21:22:54.668ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
33142026-01-14T21:22:54.668ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
33152026-01-14T21:22:54.670ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 242 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
33162026-01-14T21:22:54.670ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 242 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
33172026-01-14T21:22:54.670ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
33182026-01-14T21:22:54.670ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1
33192026-01-14T21:22:55.608ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 1
33202026-01-14T21:22:55.608ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Switch sp_slot = 0
33212026-01-14T21:22:55.608ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 0
33222026-01-14T21:22:55.609ZTRACtest_vpc_firewall (sensor-poller): interval elapsed, polling SP... chassis_type = Sled sp_slot = 1
33232026-01-14T21:22:55.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 119 }, kind: MgsRequest(SpState) }
33242026-01-14T21:22:55.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 155 }, kind: MgsRequest(SpState) }
33252026-01-14T21:22:55.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 243 }, kind: MgsRequest(SpState) }
33262026-01-14T21:22:55.609ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 243 }, kind: MgsRequest(SpState) }
33272026-01-14T21:22:55.610ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
33282026-01-14T21:22:55.610ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
33292026-01-14T21:22:55.610ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
33302026-01-14T21:22:55.610ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
33312026-01-14T21:22:55.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 155 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
33322026-01-14T21:22:55.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 119 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
33332026-01-14T21:22:55.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 243 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
33342026-01-14T21:22:55.611ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 243 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
33352026-01-14T21:22:55.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 156 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
33362026-01-14T21:22:55.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch1 request = Message { header: Header { version: 22, message_id: 120 }, kind: MgsRequest(SpState) }
33372026-01-14T21:22:55.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 244 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
33382026-01-14T21:22:55.611ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 244 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
33392026-01-14T21:22:55.611ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = sidecar 0
33402026-01-14T21:22:55.611ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.789063) }) index = 0 slot = sidecar 0
33412026-01-14T21:22:55.612ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 1
33422026-01-14T21:22:55.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 0
33432026-01-14T21:22:55.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 0
33442026-01-14T21:22:55.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 1
33452026-01-14T21:22:55.612ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 1
33462026-01-14T21:22:55.612ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 156 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33472026-01-14T21:22:55.612ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 120 } interface = fake-switch1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
33482026-01-14T21:22:55.612ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 244 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33492026-01-14T21:22:55.612ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 244 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33502026-01-14T21:22:55.613ZTRACtest_vpc_firewall (sensor-poller): polled SP, no samples returned chassis_type = Switch num_samples = 0 sp_slot = 1
33512026-01-14T21:22:55.617ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 157 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
33522026-01-14T21:22:55.617ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 245 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
33532026-01-14T21:22:55.617ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 245 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
33542026-01-14T21:22:55.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = sidecar 0
33552026-01-14T21:22:55.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = sidecar 0
33562026-01-14T21:22:55.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 0
33572026-01-14T21:22:55.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 0
33582026-01-14T21:22:55.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 1
33592026-01-14T21:22:55.619ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(62.6) }) index = 0 slot = gimlet 1
33602026-01-14T21:22:55.621ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 157 } interface = fake-switch0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33612026-01-14T21:22:55.621ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 245 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33622026-01-14T21:22:55.621ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 245 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33632026-01-14T21:22:55.624ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-switch0 request = Message { header: Header { version: 22, message_id: 158 }, kind: MgsRequest(SpState) }
33642026-01-14T21:22:55.624ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 246 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
33652026-01-14T21:22:55.624ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 246 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
33662026-01-14T21:22:55.626ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = sidecar 0
33672026-01-14T21:22:55.626ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 0
33682026-01-14T21:22:55.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Err(DeviceError) }) index = 0 slot = gimlet 0
33692026-01-14T21:22:55.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 1
33702026-01-14T21:22:55.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2510.0) }) index = 0 slot = gimlet 1
33712026-01-14T21:22:55.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2390.0) }) index = 1 slot = gimlet 1
33722026-01-14T21:22:55.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2467.0) }) index = 2 slot = gimlet 1
33732026-01-14T21:22:55.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2195.0) }) index = 3 slot = gimlet 1
33742026-01-14T21:22:55.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2680.0) }) index = 4 slot = gimlet 1
33752026-01-14T21:22:55.627ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2212.0) }) index = 5 slot = gimlet 1
33762026-01-14T21:22:55.630ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 158 } interface = fake-switch0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 83, 105, 100, 101, 99, 97, 114, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [70, 65, 75, 69, 95, 83, 73, 77, 95, 83, 73, 68, 69, 67, 65, 82, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A2, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
33772026-01-14T21:22:55.630ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 246 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33782026-01-14T21:22:55.630ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 246 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
33792026-01-14T21:22:55.632ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Switch num_samples = 3 sp_slot = 0
33802026-01-14T21:22:55.638ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 247 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
33812026-01-14T21:22:55.638ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 247 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-0" }, offset: 0 }) }
33822026-01-14T21:22:55.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 0
33832026-01-14T21:22:55.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.45898438) }) index = 0 slot = gimlet 0
33842026-01-14T21:22:55.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.024414063) }) index = 1 slot = gimlet 0
33852026-01-14T21:22:55.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.03125) }) index = 2 slot = gimlet 0
33862026-01-14T21:22:55.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.328125) }) index = 3 slot = gimlet 0
33872026-01-14T21:22:55.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for number of component details num_details = 1 slot = gimlet 1
33882026-01-14T21:22:55.640ZDEBGtest_vpc_firewall (SpComponent { id: "dev-0" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Temperature, value: Ok(41.3629) }) index = 0 slot = gimlet 1
33892026-01-14T21:22:55.643ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 247 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
33902026-01-14T21:22:55.644ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 247 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33912026-01-14T21:22:55.652ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 248 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
33922026-01-14T21:22:55.652ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 248 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-2" }, offset: 0 }) }
33932026-01-14T21:22:55.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 0
33942026-01-14T21:22:55.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 0
33952026-01-14T21:22:55.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for number of component details num_details = 1 slot = gimlet 1
33962026-01-14T21:22:55.652ZDEBGtest_vpc_firewall (SpComponent { id: "dev-2" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Temperature, value: Ok(41.570313) }) index = 0 slot = gimlet 1
33972026-01-14T21:22:55.652ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 248 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33982026-01-14T21:22:55.652ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 248 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
33992026-01-14T21:22:55.653ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 249 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-46" }, offset: 0 }) }
34002026-01-14T21:22:55.653ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 249 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-1" }, offset: 0 }) }
34012026-01-14T21:22:55.653ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for number of component details num_details = 1 slot = gimlet 0
34022026-01-14T21:22:55.653ZDEBGtest_vpc_firewall (SpComponent { id: "dev-46" }): asked for component details for a sensor details = Measurement(Measurement { name: "CPU", kind: Temperature, value: Ok(64.5) }) index = 0 slot = gimlet 0
34032026-01-14T21:22:55.653ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for number of component details num_details = 1 slot = gimlet 1
34042026-01-14T21:22:55.653ZDEBGtest_vpc_firewall (SpComponent { id: "dev-1" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Temperature, value: Ok(42.5625) }) index = 0 slot = gimlet 1
34052026-01-14T21:22:55.653ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 249 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
34062026-01-14T21:22:55.653ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 249 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
34072026-01-14T21:22:55.655ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 250 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-8" }, offset: 0 }) }
34082026-01-14T21:22:55.655ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 250 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-7" }, offset: 0 }) }
34092026-01-14T21:22:55.655ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for number of component details num_details = 1 slot = gimlet 0
34102026-01-14T21:22:55.655ZDEBGtest_vpc_firewall (SpComponent { id: "dev-8" }): asked for component details for a sensor details = Measurement(Measurement { name: "U2_N0", kind: Temperature, value: Ok(56.0) }) index = 0 slot = gimlet 0
34112026-01-14T21:22:55.655ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for number of component details num_details = 4 slot = gimlet 1
34122026-01-14T21:22:55.655ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Current, value: Ok(0.41893438) }) index = 0 slot = gimlet 1
34132026-01-14T21:22:55.655ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Current, value: Ok(0.025614602) }) index = 1 slot = gimlet 1
34142026-01-14T21:22:55.655ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V12_U2A_A0", kind: Voltage, value: Ok(12.02914) }) index = 2 slot = gimlet 1
34152026-01-14T21:22:55.655ZDEBGtest_vpc_firewall (SpComponent { id: "dev-7" }): asked for component details for a sensor details = Measurement(Measurement { name: "V3P3_U2A_A0", kind: Voltage, value: Ok(3.2618) }) index = 3 slot = gimlet 1
34162026-01-14T21:22:55.657ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 250 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
34172026-01-14T21:22:55.657ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 250 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 4 })
34182026-01-14T21:22:55.661ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 251 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-53" }, offset: 0 }) }
34192026-01-14T21:22:55.661ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 251 }, kind: MgsRequest(ComponentDetails { component: SpComponent { id: "dev-39" }, offset: 0 }) }
34202026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for number of component details num_details = 6 slot = gimlet 0
34212026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southeast", kind: Speed, value: Ok(2607.0) }) index = 0 slot = gimlet 0
34222026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northeast", kind: Speed, value: Ok(2476.0) }) index = 1 slot = gimlet 0
34232026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "South", kind: Speed, value: Ok(2553.0) }) index = 2 slot = gimlet 0
34242026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "North", kind: Speed, value: Ok(2265.0) }) index = 3 slot = gimlet 0
34252026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Southwest", kind: Speed, value: Ok(2649.0) }) index = 4 slot = gimlet 0
34262026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-53" }): asked for component details for a sensor details = Measurement(Measurement { name: "Northwest", kind: Speed, value: Ok(2275.0) }) index = 5 slot = gimlet 0
34272026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for number of component details num_details = 1 slot = gimlet 1
34282026-01-14T21:22:55.661ZDEBGtest_vpc_firewall (SpComponent { id: "dev-39" }): asked for component details for a sensor details = Measurement(Measurement { name: "t6", kind: Temperature, value: Ok(70.625) }) index = 0 slot = gimlet 1
34292026-01-14T21:22:55.661ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 251 } interface = fake-sled0 response = ComponentDetails(TlvPage { offset: 0, total: 6 })
34302026-01-14T21:22:55.662ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 251 } interface = fake-sled1 response = ComponentDetails(TlvPage { offset: 0, total: 1 })
34312026-01-14T21:22:55.666ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled0 request = Message { header: Header { version: 22, message_id: 252 }, kind: MgsRequest(SpState) }
34322026-01-14T21:22:55.666ZTRACtest_vpc_firewall (ManagementSwitch): sending request to SP attempt = 1 interface = fake-sled1 request = Message { header: Header { version: 22, message_id: 252 }, kind: MgsRequest(SpState) }
34332026-01-14T21:22:55.668ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 0
34342026-01-14T21:22:55.668ZDEBGtest_vpc_firewall: received state request reply-state = SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) } slot = gimlet 1
34352026-01-14T21:22:55.668ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 252 } interface = fake-sled0 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 48, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
34362026-01-14T21:22:55.668ZTRACtest_vpc_firewall (ManagementSwitch): received response from SP header = Header { version: 22, message_id: 252 } interface = fake-sled1 response = SpStateV2(SpStateV2 { hubris_archive_id: [0, 0, 0, 0, 0, 0, 0, 0], serial_number: [83, 105, 109, 71, 105, 109, 108, 101, 116, 48, 49, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], model: [105, 56, 54, 112, 99, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0, 0], revision: 0, base_mac_address: [0, 0, 0, 0, 0, 0], power_state: A0, rot: Ok(RotStateV2 { active: A, persistent_boot_preference: A, pending_persistent_boot_preference: None, transient_boot_preference: None, slot_a_sha3_256_digest: Some([170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170, 170]), slot_b_sha3_256_digest: Some([187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187, 187]) }) })
34372026-01-14T21:22:55.668ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 17 sp_slot = 0
34382026-01-14T21:22:55.668ZTRACtest_vpc_firewall (sensor-poller): polled SP successfully chassis_type = Sled num_samples = 16 sp_slot = 1